
¡ÒÃàª×èÍÁµè͡ѺÍÔ¹àµÍÃìà¹çµ 57
¡ÒÃàª×èÍÁµè͡Ѻ Access Point:
¡ÒÃàª×èÍÁµè͡Ѻ access point ËÃ×Íà¹çµàÇÔÃ졢ͧ¤ÍÁ¾ÔÇàµÍÃìä»Âѧ¤ÍÁ¾ÔÇàµÍÃì (Ad Hoc) ãËé·ÓµÒÁ¢Ñ鹵͹µèÍ仹Õé (¡ÒÃÊÃéÒ§
à¹çµàÇÔÃì¡ÃÐËÇèÒ§¤ÍÁ¾ÔÇàµÍÃìÊͧà¤Ã×èͧ ãËé·ÓµÒÁ¢Ñ鹵͹
"
¡ÒÃÊÃéÒ§à¹çµàÇÔÃì¡ÃÐËÇèÒ§¤ÍÁ¾ÔÇàµÍÃìä»Âѧ¤ÍÁ¾ÔÇàµÍÃì (Ad Hoc)
"
)
1.
ã¹ÃÒ¡Òà Available Networks ãËé¤ÅÔ¡·Õè
Refresh
2.
àÅ×Í¡ª×èÍ access point ËÃ×Íà¹çµàÇÔÃ졤ÍÁ¾ÔÇàµÍÃìä»Âѧ¤ÍÁ¾ÔÇàµÍÃì·Õèµéͧ¡ÒÃà¾×èÍ·Ó¡ÒÃàª×èÍÁµèͨҡÅÔʵì searched available
networks áÅéǤÅÔ¡
Configure
ËÒ¡à¹çµàÇÔÃì¡·Õèµéͧ¡ÒÃäÁè»ÃÒ¡¯¢Öé¹ ãËé¤ÅÔ¡
Refresh
access point ¨Ð¶Ù¡áÊ´§â´Âäͤ͹ (
) áÅÐ à¹çµàÇÔÃì¡ÃÐËÇèÒ§¤ÍÁ¾ÔÇàµÍÃì¨Ð¶Ù¡áÊ´§â´Âäͤ͹ (
)
äͤ͹ (
) ¨Ð¶Ù¡áÊ´§äÇé˹éÒ access point ËÃ×Íà¹çµàÇÔÃì¡ÃÐËÇèÒ§¤ÍÁ¾ÔÇàµÍÃì¾ÃéÍÁ´éÇ¡ÒÃ
¡Ó˹´¤èÒ¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑÂ
3.
»é͹¢éÍÁÙÅ
Profile Name
áÅéǤÅÔ¡
Next
4.
ã¹ÇÔ¹â´Çì Search Security Settings ¨Ð»ÃÒ¡¯¢éͤÇÒÁ wireless network security search ¢Öé¹ ¤ÅÔ¡
Next
5.
»é͹¤èÒ
network authentication
,
data encryption (WEP)
,
encryption level,
key index
áÅÐ
wireless security
password
¡Ó˹´¤èҤ͹¿Ô¡ãËé¡Ñº access point ·Õèµéͧ¡ÒÃËÃ×Íà¹çµàÇÔÃì¡ÃÐËÇèÒ§¤ÍÁ¾ÔÇàµÍÃìã¹ÇÔ¹â´Çì Security Settings
áÅéǤÅÔ¡
Next
¤èÒ network authentication, data encryption (WEP), key index áÅÐÃËÑʼèÒ¹¢Í§ access point ¨Ðä´éÃѺ¡ÒÃ
¡Ó˹´¤èÒã¹â»Ãá¡ÃÁ¡Ó˹´¤èҢͧ access point ÊÓËÃѺ¢éÍÁÙÅà¡ÕèÂǡѺ¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑ ãËéµÃǨÊͺ
¡ÒáÓ˹´¤èÒ¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑ¢ͧ access point ËÃ×ÍÊͺ¶ÒÁ¨Ò¡¼Ùé´ÙáÅÃкºà¹çµàÇÔÃ졢ͧ¤Ø³
¡ÒÃàª×èÍÁµèÍä»Âѧà¹çµàÇÔÃì¡ÃÐËÇèÒ§à¤Ã×èͧ¤ÍÁ¾ÔÇàµÍÃì (Ad Hoc) ãËé»é͹ÃËÑʼèÒ¹·Õèä´éÃѺ¡ÒáÓ˹´äÇéàÁ×èÍÁÕ¡ÒÃ
ÊÃéÒ§à¹çµàÇÔÃ존ѧ¡ÅèÒÇà»ç¹¤ÃÑé§áá â´ÂäÁè¨Óà»ç¹µéͧ»é͹ network authentication ËÃ×Í key index
¡ÒáÓ˹´¤èÒÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑÂ
-
¡ÒõÃǨÊͺÊÔ·¸Ô¡ÒÃãªé§Ò¹à¹çµàÇÔÃì¡
: µÑÇàÅ×Í¡ network authentication ¨ÐÃÇÁ¶Ö§ Open System áÅÐ Shared Key
àÁ×èͤسàÅ×Í¡ Open System ¨ÐäÁèÁÕ¡ÒÃãªé¡ÒõÃǨÊͺÊÔ·¸Ô¡ÒÃãªé§Ò¹ (áµèÂѧ¤§ÁÕ¡ÒÃà¢éÒÃËÑÊ¢éÍÁÙÅÍÂÙè)
àÁ×èͤسàÅ×Í¡ Shared Key ¨ÐÁÕ¡ÒÃãªé§Ò¹ WEP key 㹡ÒõÃǨÊͺÊÔ·¸Ô¡ÒÃãªé§Ò¹ ¤èÒ´Õ¿Íŵì¤×Í Open System
-
Data encryption (WEP)
: Áҵðҹ IEEE 802.11 WEP (Wired Equivalent Privacy) ãªéÃкØÃдѺ¡ÒÃà¢éÒÃËÑÊ
ÊͧÃдѺ ¤×Í 64-ºÔµ¤ÕÂì (ºÒ§¤ÃÑé§áÊ´§à»ç¹ 40ºÔµ) áÅÐ 128-ºÔµ¤ÕÂì