Back to Contents
Personal Security
Use Personal Security if you are a home or small business user who can use a variety of simple security
procedures to protect your WiFi connection. You may want to select from the list of security settings that are easy
to configure, for your WiFi network. See
Personal Security Settings
for a description of each of the options. A
RADIUS
or
AAA
server is not required.
Review the
Set up Data Encryption and Authentication
information to learn about the different security
types.
To add or change the required security settings, click
Security Settings
for information to set security for the
selected WiFi network.
See
Profile Management
for a description of when to use the Profile Wizard.
See
Security Overview
for more information about the different security options for WiFi networks.
If you want to verify the security settings, select a WiFi network in the WiFi Networks list. See
Network
Properties
to review the operating mode, authentication level, and data encryption.
See
Enterprise Security
to set 802.1X authentication security.
Personal Security Settings
Personal Security Settings Description
Name
Setting
General
Settings
Select to open the Personal Security Settings. The security settings that are available are dependent
on the Operating Mode selected in the
Create WiFi Profile Security Settings
.
Device to Device (ad hoc)
: In device to device mode, also called ad hoc mode, wireless computers
send information directly to other wireless computers. You can use ad hoc mode to connect multiple
computers in a home or small office, or to set up a temporary wireless network for a meeting.
NOTE
: Device to Device (ad hoc) networks are identified with a notebook image (
) in
the WiFi Networks and Profiles list.
Network (Infrastructure)
: An infrastructure network consists of one or more access points and one
or more computers with WiFi adapters installed. At least one access point should also have a wired
connection. For home users, this is usually a broadband or cable network.
NOTE
: Infrastructure networks are identified with an access point image (
) in the WiFi
Networks and Profiles list.
Security
Settings
If you are configuring a Device to Device (ad hoc) profile, select one of the following data encryption
settings:
None
: No authentication required.
WEP-64 bit
or
WEP-128 bit:
A network key or password is used for encryption.
If you are configuring a Network (Infrastructure) profile, select:
WPA*-Personal (TKIP)
or
WPA2*-Personal (TKIP)
: WPA-Personal uses the Temporal Key
Integrity Protocol (TKIP) for data encryption.
WPA-Personal (AES-CCMP)
or
WPA2-Personal (AES-CCMP)
: WPA-Personal uses a new method
for privacy protection of wireless transmissions specified in the IEEE 802.11i standard.
Advanced
button
Click to access the
Advanced Settings
and configure the following options:
Auto Connect
: Select to automatically or manually connect to a profile.
Intel® PROSet/Wireless WiFi Connection Utility User's Guide
Содержание 512AN_HMW
Страница 59: ...Back to Contents Trademarks and Disclaimers Intel PROSet Wireless WiFi Connection Utility User s Guide ...
Страница 105: ...Back to Top Back to Contents Trademarks and Disclaimers Intel PROSet Wireless WiFi Connection Utility User s Guide ...
Страница 136: ...Back to Top Back to Contents Trademarks and Disclaimers Intel PROSet Wireless WiFi Connection Utility User s Guide ...