background image

11

WPA, continued

Parameter

Description

Network Authentication

Open

– No authentication is needed.

Shared 

– Only wireless stations using a shared key 

(WEP Key identified) are allowed to connect to 
each other.

WPA

– This mode is for enterprise users with an 

authentication server (Radius Server), WPA-enabled
access point, and a WPA-enabled client. Once WPA
is enabled, all clients and access points on the 
network must be WPA-enabled in order to access 
the network.

WPA-PSK 

– This is a special mode designed for 

home and small business users who do not have 
access to network authentication servers. In this 
mode, known as Pre-Shared Key, the user manually 
enters the starting password in their access point or 
gateway, as well as in each PC on the wireless 
network. WPA takes over automatically from that 
point, keeping unauthorized users that don't have 
the matching password from joining the network, 
while encrypting the data traveling between 
authorized devices.

Data Encryption

WEP –

In WPA or WPA-PSK mode, WEP is also able

to be the encryption method for the transmission 
data.

TKIP

– TKIP (Temporal Key Integrity Protocol) 

changes the temporal key every 10,000 packets (a 
packet is a kind of message transmitted over a 
network.) This insures much greater security than 
the standard WEP security.

AES – AES has been developed to ensure the 
highest degree of security and authenticity for 
digital information. It is the most advanced 
solution defined by IEEE 802.11i for security in 
the wireless network.

Note:

All devices in the network should use the same encryption method to ensure

communication.

Summary of Contents for CB555WG

Page 1: ...Adapter CB555WG Instruction Guide The Professionals Source For Hard to Find Computer Parts 8 80 02 2 1 11 1g g W WI IR RE EL LE ES SS S L LA AN N C CA AR RD DB BU US S A AD DA AP PT TE ER R Actual pro...

Page 2: ...ircuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help Federal Communications Commission FCC Radiation Exposure Statement This...

Page 3: ...onfiguration Utility 4 Status 5 Site Survey 7 Profile Configuration 8 General 8 Encryption 9 WPA 10 Advanced 12 Statistics 13 About 14 Appendix A Installation Considerations 15 Glossary 16 Technical S...

Page 4: ...aptop computer with wireless LAN access Offers high data transfer rate up to 54 Mbits sec Uses low levels of power to preserve notebook battery life Compatible with IEEE 802 11g and 802 11b devices Us...

Page 5: ...ll 5 Windows will install the driver and utility of the card automatically Click Finish to complete the installation Note Windows XP users may see the Windows Logo Testing warning This is normal This...

Page 6: ...ending on the signal strength There are three colors that represent signal strength Green signal strength from 100 50 Yellow 50 25 or Red below 25 You can open the Configuration Utility by clicking on...

Page 7: ...ireless network the adapter is connecting to up to 32 printable ASCII characters Link Status Displays the status of the connection Scanning Connected or Disconnected Network Type Displays the mode the...

Page 8: ...nal strength The higher the percentage the better the signal This indicator can help you find the best position for your wireless devices Link Quality Displays the quality of the link The higher the p...

Page 9: ...ngs etc Use this information to decide which network to connect to Rescan Button Click Rescan to get the latest information of all the wireless networks nearby Profiles This Profiles list shows all th...

Page 10: ...e if the network uses an Access Point for communication Ad Hoc Choose Ad Hoc if the network is another wireless station that will communicate directly with the CB555WG SSID Enter the SSID up to 32 pri...

Page 11: ...tion algorithm depending on the wireless networks that the adapter is connecting to Encryption Key Select the default encryption key using the radio buttons Fill the text box by following the rules be...

Page 12: ...for dynamic key exchange and 802 1x for authentication WPA function is enabled in the following software systems only Windows XP with Service Pack 1 and the Windows XP Support Patch for Wi Fi Protecte...

Page 13: ...int or gateway as well as in each PC on the wireless network WPA takes over automatically from that point keeping unauthorized users that don t have the matching password from joining the network whil...

Page 14: ...elected the card will automatically switch the preamble type depending on the wireless network the card is connecting to Fragment Threshold The value defines the maximum size of packets Any packet lar...

Page 15: ...about your network communication You can view the available statistic information with its Transfer counts Tx Success Tx Error and Throughput and its Receiving counts Rx success Rx error and Throughpu...

Page 16: ...14 About By choosing this option you can view basic information about the configuration utility such as the Driver and Utility Version...

Page 17: ...st cross can reduce the signal range by up to 90 feet 30m Position your receiving devices so that the path between them is as unobstructed as possible The type of material the wireless signal must cro...

Page 18: ...e the information See also WEP Encryption Algorithm A formula used to convert data from understandable plaintext into encoded ciphertext Each algorithm uses a key a string of bits to perform the calcu...

Page 19: ...ubnet Subnet masks are expressed as four decimal numbers between 0 and 255 separated by periods Example 255 255 255 1 It is used to create private IP addresses for use within a particular network Also...

Page 20: ...ion WPA TKIP with IEEE 802 1x and AES Antenna Printed Antenna with Diversity System LED indicators Tx Rx Link Data transfer rate Up to 54 Mbits sec 802 11g 11 Mbits sec 802 11b Supported bit rates 54...

Page 21: ...Information This product is backed by a one year warranty In addition StarTech com warrants its products against defects in materials and workmanship for the periods noted following the initial date o...

Page 22: ...Revised February 23 2004...

Reviews: