background image

8

9

You can now store four codes in the lower section of the window. The selected code is always used.
64 bit or 128 bit encryption is supported. 128 bit encryption is more secure. First select whether you want to 
use 

Hex

 (allows characters from 0-9 and a-f to be used) or 

ASCII

 characters (You can use any characters). 

The setting and the selection of either 64 or 128 bit encryption determines the length of the code to be 
entered.

WEP 64 bit ASCII requires 5 characters
WEP 64 bit HEX requires 10 characters
WEP 128 bit ASCII requires 13 characters
WEP 128 bit HEX requires 26 characters

Examples: 

64 bit Hex (10 characters) = 231074a6ef

 

 

64 bit ASCII (5 characters) = j31n.

 

 

128 bit Hex (26 characters) = 231074a6b9773ce43f91a5bef3

 

 

128 bit ASCII (13 characters) = urla0

3.2.2.2 WPA/WPA2 encryption

Wi-Fi Protected Access 

(WPA)

 is an encryption method for WLAN. WPA contains the WEP architecture, 

but offers additional protection via dynamic codes, which are based on the Temporal Key Integrity Protocol 
(TKIP), and also offers pre-shared keys (PSK) or extensible authentication protocol (EAP) for user 
authentication. However, a radius server is required for this. 

WPA2

 is a development of WPA and uses a 

different encryption algorithm, advanced encryption standard (AES).

WPA offers two types of authentication, either 

pre-shared key

 or authentication via special 

authentication

 

protocols

, which are generally variations of EAP (Extensible Authentication Protocol). An authentication 

server 

(RADIUS server)

 is used for the latter authentication method, which is rarely used for private 

applications. Your administrator can give you the information you require to confi gure this authentication 
method.

The 

pre-shared key

 method is more common and offers a high degree of security.

To use

 WPA encryption

, select WPA-PSK under 

Authentication type and 

TKIP

 under Encryption.

Now enter the code used in the 

WPA preshared key

 fi eld.

The code entered must be absolutely identical with that 
used in the network. It must be min. 8 and max. 63 random 
characters for ASCII. Letters, numbers and special 
characters can be used. 64 characters are required for 
HEX, whereby only characters from 0-9 and a-f can be 
used. If you do not have this code, it can be found in your 
router/access point or you can ask the person responsible 
for these devices.

Save the settings and click 

OK.

To use 

WPA2 encryption

, select 

WPA2-PSK

 under 

Authentication type and 

AES

 under Encryption.

Now enter the code used in the WPA preshared key fi eld.

The code entered must be absolutely identical with that 
used in the network. It must be min. 8 and max. 63 random 
characters for ASCII. Letters, numbers and special 
characters can be used. 64 characters are required for 
HEX, whereby only characters from 0-9 and a-f can be 
used. If you do not have this code, it can be found in your 
router/access point or you can ask the person responsible 
for these devices.

Save the settings and click 

OK. 

To activate the profi le created, switch to the 

Profi les

 tab, select the profi le and then click 

Activate.

 

 

4. Confi guring the operating system and computer (Windows®)

After you have successfully installed the network adapter, you still have to install or confi gure a protocol. This 
protocol governs the data exchange between the computer and the network. TCP/IP is most common. Each 
computer has to be assigned its own address for the protocol. Automatic address assignment is only reliable 
if a DHCP server exists in the network, e.g. a router or access point. If you have one of these devices with a 
DHCP function, you should leave the setting on “Get automatically”. 

Proceed as follows to check the settings on your PC:

Start -> Settings -> Control panel -> Network connections

Select the connection (network adapter) via which your 
PC is connected to the router, e.g. “LAN connection”. 
When you 

right-click

 the corresponding connection, the 

following screen is displayed when you select 

Properties.

Select the 

Internet Protocol (TCP/IP)

 entry in the list and 

click 

Properties.

Содержание 62732

Страница 1: ...u s t e r Wireless LAN PCI Card MiMo 300 Express 00062732 www hama de Hama GmbH Co KG Postfach 80 86651 Monheim Germany Tel 49 0 9091 502 0 Fax 49 0 9091 502 274 hama hama de www hama de 00062732 05 0...

Страница 2: ...istent f r das Suchen neuer Hardware Beenden Sie diesen mit Abbrechen Bitte speichern Sie vor der Installation alle evtl offenen Dokumente die Sie gerade bearbeiten Schlie en Sie danach alle laufenden...

Страница 3: ...Namen abzuspeichern M chten Sie sich z B abwechselnd mit verschiedenen drahtlosen Netzwerken verbinden so k nnen Sie die Einstellungen f r die Netzwerke in Profilen speichern wodurch eine schnelle Umk...

Страница 4: ...ung verwendet werden wechseln Sie zur Registerkarte Authentifi zierung und Sicherheit und setzen Sie die Konfiguration unter Wireless LAN Verschl sselung einstellen fort Betreiben Sie ihr Netzwerk ohn...

Страница 5: ...absolut identisch mit dem im Netzwerk verwendetet Schl ssel sein Er hat eine L nge von mindestens 8 und h chstens 63 beliebigen Zeichen bei ASCII wobei Buchstaben Zahlen und Sonderzeichen erlaubt sin...

Страница 6: ...e Programme bevor Sie den PC neu starten 6 Installation von Treiber und Konfigurations Programm unter MAC OS X Bitte speichern Sie vor der Installation alle evtl offenen Dokumente die Sie gerade bearb...

Страница 7: ...WLAN Netzwerk aus indem Sie in der Liste in die entsprechende Zeile klicken Das gew hlte Netzwerk ist in der Liste jetzt blau hinterlegt Klicken Sie jetzt auf den Button Connect Sie sind mit dem Netzw...

Страница 8: ...nem Passwort oder einem beliebigen anderen Berechtigungsnachweis geschehen Verschl sselung Encryption Die Verschl sselung ist ein Vorgang bei dem ein Klartext mit Hilfe eines Verschl sselungsverfahren...

Страница 9: ...ivaten Bereich doch eher seltene Authentifizie rungsmethode wird ein so genannter Authentifizierungsserver RADIUS Server verwendet Die Angaben die sie zur Konfiguration dieser Authentifizierungsmethod...

Страница 10: ...rogram on Windows After you start the operating system the Windows New Hardware Wizard dialogue box opens Click Cancel to close it Before installation please save any open documents you may be working...

Страница 11: ...ves to save various settings for a connection under a certain name For example if you want to connect to various wireless networks you can save the settings for the networks in profiles which allows y...

Страница 12: ...your network uses encryption switch to the Authentication and Security tab and continue configuration under Setting wireless LAN encryption If your network is not encrypted click OK to accept the set...

Страница 13: ...hared key field The code entered must be absolutely identical with that used in the network It must be min 8 and max 63 random characters for ASCII Letters numbers and special characters can be used 6...

Страница 14: ...ve all open documents and close all programs before restarting the PC 6 Installing the driver and configuration program on MAC OS X Before installation please save any open documents you may be workin...

Страница 15: ...less networks again 8 1 Quick configuration First select the required WLAN network by clicking the corresponding line in the list The network selected is highlighted in blue in the list Now click the...

Страница 16: ...a certain characteristic This can be done by fingerprint password or any other proof of authorisation Encryption Encryption is a process in which a plain text is transformed into a coded text via an...

Страница 17: ...rotocol An authentication server RADIUS server is used for the latter authentication method which is rarely used for private applications Your administrator can give you the information you require to...

Страница 18: ...t d marr Quittez ce dernier en cliquant sur annuler Veuillez sauvegarder tous vos documents ouverts avant de lancer l installation Quittez ensuite tous les programmes actifs Ins rez le CD ROM fourni d...

Страница 19: ...auvegarder diff rentes configurations de connexion sous une certaine d nomination Vous pourrez donc vous connecter diff rents r seaux sans fil en sauvegardant leurs param tres sous des profils distinc...

Страница 20: ...nuez la configuration sous Configuration du chiffrement du r seau local sans fil dans le cas o vous utilisez un chiffrement pour votre r seau Confirmez vos r glages avec OK dans le cas o votre r seau...

Страница 21: ...ment identique au code utilis dans le r seau Le code comporte au moins 8 caract res et au plus 63 en cas de codage ASCII les lettres les chiffres et les caract res sp ciaux peuvent tre utilis s Le cod...

Страница 22: ...ible que vous deviez red marrez votre ordinateur apr s la d sinstallation du programme Sauvegardez tous vos documents ouverts et fermez toutes les applications avant de red marrer votre ordinateur 6 I...

Страница 23: ...d sirez utiliser en cliquant sur son nom dans la liste Le r seau s lectionn appara t alors contrast en bleu Cliquez sur le bouton Connecter Il est possible que vous soyez connect e automatiquement un...

Страница 24: ...Cette caract ristique peut tre une empreinte digitale un mot de passe ou tout autre justificatif Chiffrement Encryption Le chiffrement est une proc dure au cours de laquelle un texte en langage clair...

Страница 25: ...domaine priv n cessite un serveur d authentification serveur RADIUS Vous pouvez vous procurer les informations requises pour la configuration de cette m thode d authentification chez votre administrat...

Страница 26: ...tion af driver og konfigurationsprogram under Windows Efter start af styresystemet ses Windows dialog assistenten til s gning efter ny hardware Afslut dette med afbryd Gem alle bne dokumenter inden in...

Страница 27: ...m forskellige tr dl se netv rk kan du gemme indstillingerne for netv rkene i profiler og dermed f mulighed for hurtig omkonfiguration 3 2 1 Oprettelse af ny profil For at kunne oprette en profil har d...

Страница 28: ...r dighed i Europa Hvis der bruges en sikkerhedskryptering i dit netv rk skal du skifte til fanebladet Authentication and Security og forts tte konfigurationen under Indstilling af tr dl s LAN sikkerh...

Страница 29: ...n gle skal v re fuldst ndig identisk med den n gle der anvendes i netv rket Den har en l ngde p mindst 8 og maks 63 vilk rlige tegn ved ASCII hvor b de bogstaver tal og specialtegn er tilladt eller 6...

Страница 30: ...kan det v re n dvendigt at genstarte systemet Gem derfor alle bne dokumenter og luk alle programmer inden du genstarter din pc 6 Installation af driver og konfigurationsprogram under MAC OS X Gem alle...

Страница 31: ...g f rst det nskede WLAN netv rk ved at klikke p den tilsvarende linje i listen Det valgte netv rk f r nu en bl baggrund i listen Klik s p knappen Connect Du er tilsluttet netv rket n r det valgte netv...

Страница 32: ...hj lp af et fingeraftryk et password eller en hvilken som helst anden autorisationsdokumentation Kryptering Encryption Krypteringen er en proces hvor en klartekst forvandles til en chiffertekst via e...

Страница 33: ...e der dog sj ldent bruges af private anvendes en s kaldt autentificeringsserver RADIUS server De oplysninger der kr ves til konfiguration af denne autentificeringsmetode f r du af din administrator Me...

Страница 34: ...Prehl senie o zhode pod a R TTE smernice 99 5 EG J n jdete na www hama de Radio jatelep telaitteitakoskevandirektiivin99 5 EY mukainenvaatimustenmukaisuusvakuutusl ytyyosoitteesta www hama de Konform...

Отзывы: