background image

 

11 

 

 

 

 

3.3 Security 

In the 

“Security”

, you can enable or disable the WEP, TKIP and AES WLAN security 

mechansims for the adapter. 
 
WEP is an authentication algorithm, which protects authorized Wireless LAN users against 
eavesdropping. WEP has been found that it has some security problems. TKIP is a 
temporary quick-fix method defined in IEEE 802.11i standard to quickly overcome the 
inherent weaknesses in WEP security. AES has been developed to ensure the highest 
degree of security and authenticity for digital information and it is the most advanced 
solution defined by IEEE 802.11i for the security in the wireless network. 
 
The security setting must be the the same on the wireless devices within the network. This 
adapter supports 64/128-bit WEP, TKIP and AES encryption functions. 
 

   

 

 
 

 
 

 
 

 
 

Содержание EW-7106PC

Страница 1: ...W Wi ir re el le es ss s L LA AN N C Ca ar rd db bu us s A Ad da ap pt te er r User Manual Version 1 0 Dec 2002...

Страница 2: ...arranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer a...

Страница 3: ...an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This equipment must be installed and operated...

Страница 4: ...tention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at...

Страница 5: ...ONTENTS 2 2 INSTALLATION PROCEDURE 3 2 1 WINDOWS 98SE ME 2000 3 2 1 1 Install the Driver 3 2 1 2 Install the Utility 3 2 2 WINDOWS XP 4 3 CONFIGURATION UTILITY 7 3 1 CONFIGURATION 7 3 2 LINK STATE 9 3...

Страница 6: ...128 bit WEP Data Encryption function for high level of security Support TKIP and AES advanced WLAN Security Supports peer to peer communication among any wireless users no Access Point required Automa...

Страница 7: ...Contents Before you begin the installation please check the items of your package The package should include the following items One Wireless Cardbus Adapter One CD Driver Utility User s Manual One Q...

Страница 8: ...Insert the adapter into the Cardbus port of your computer the system will automatically find the device and search for its driver 2 Please select the Driver Win2000 folder select the folder based on...

Страница 9: ...esktop In the taskbar 2 2 Windows XP The installation process in Windows XP is similar with the process in windows 98SE Me 2000 Please refer to the instructions described in section 2 1 Due to the Win...

Страница 10: ...ireless Network Connection Properties screen uncheck the setting Use Windows to configure my wireless network settings Note that if you want to change back to the Windows XP built in utility check the...

Страница 11: ...6 Note If you don t disable the XP s Utility you can still see the link status and statistics during communication process from the adapter s utility...

Страница 12: ...about the wireless LAN Parameter Description Network Type Infrastructure This operation mode requires the presence of an 802 11 Access Point All communication is done via the Access Point Ad Hoc Sele...

Страница 13: ...d to the WLAN network periodly The beacon period is fixed in 100ms Power Save CAM Continuous Access Mode Adapter will always set in active mode Max Enable the adapter in the power saving mode when it...

Страница 14: ...o be set Basic Click Apply button to save the above configurations click Undo button to cancel the settings Note The data rate is auto fallback among the range of the used data rate in case obstacles...

Страница 15: ...the bar the more radio signal been received by the adapter This indicator helps to find the proper position of the wireless device for quality network operation Signal Quality This bar indicates the...

Страница 16: ...a temporary quick fix method defined in IEEE 802 11i standard to quickly overcome the inherent weaknesses in WEP security AES has been developed to ensure the highest degree of security and authentici...

Страница 17: ...ave to continue setting the AES Key Length and the encryption keys Auth Algorithm This setting has to be consistent with the wireless devices which the adapter intends to connect Open System No authen...

Страница 18: ...ansmitted in the wireless network Fill the text box by following the rules below 64 bit Input 10 digit Hex values in the A F a f and 0 9 range as the encryption keys For example 0123456aef 128 bit Inp...

Страница 19: ...independent wireless LAN Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation 4 What is Infrastructure An integrated wireless and wireless and wired LAN is called a...

Страница 20: ...to both transmitter and receiver Properly synchronized the net effect is to maintain a single logical channel To an unintended receiver FHSS appears to be short duration impulse noise Direct sequence...

Отзывы: