44 Users Manual
For information about the encryption key (WEP key) of your AP, ask your AP
administrator or network administrator.
A network key consists of either 5 or 13 alphanumeric characters(e.g. magic),
or 10 or 26 hexadecimal(0-9 or A-F).
6.
When your computer is connected to an access point, the connection (
)icon
appears in front of the added wireless network connection profile name.
When a profile is created, the new profile is added to the
My Preferred
Network Profiles
list. Double-clicking the profile displays Activate or Edit a
Preferred Profile window. Select
Activate Profile
and the click on
OK
to make
a connection using the profile.
To create an Ad Hoc network:
To create a new computer-to-computer (Ad Hoc) network or to connect to a hidden
access point (Stealth/Closed Mode), refer to the following procedures.
A hidden access point is an access point that exists, but is configured not to
be detected by the scan operation to prevent access attempts from
unauthorized users.
1.
Click on
Add / Edit Preferred Profiles
in the Action menu.
2.
Click on
Add
in My Preferred Network Profiles.
3.
Select
Create a new network profile
and click
OK
.
4.
Enter a
Profile Name
and
Network Name
.
To create a new Ad hoc network, select a Peer-to-Peer group in Create Network.
In this case, you can select the channel to use.
5.
In the Wireless network key (WEP) field, select
Enable Encryption
and enter the
encryption key to be used for the network and then click
OK
.
To connect to the access point, enter the network encryption key configured in the
access point and then click
OK
.
It is recommended configuring data encryption for security purposes when
creating an Ad Hoc network profile. For more information about security
configuration, refer to the Security Setting of connection to an Access Point or
the online Help.
6.
When a profile has been created, the new profile is added to the My Proferred
Network Profiles list. To connect to the Ad Hoc network, select and
double-click