background image

7

WEP Key Settings

The WEP Key Setting screen lets you configure your WEP encryption settings. WEP
protects authorized LAN users against eavesdroppers. With WEP enabled, your data will
be transmitted over your network more securely.

Parameter

Description

Authentication Mode

The setting must be consistent with the other wireless stations
you want to connect to.

Open System: No authentication is needed.

Shared Key: Only wireless stations using a shared key (WEP
key identified) are allowed to connect with each other. Set up 
the same key with each wireless adapter you want to connect 
to.

Auto: Auto switch the authentication algorithm depending on
the wireless stations that the adapter is connecting to.

Key Length

Select either 64-bit or 128-bits. The larger key length will 
provide more security, but will lower throughput.

Default Key ID

Select one of the keys (1~4) as the encryption key.

Key 1 ~ Key 4

For each key, fill in the text box using the rules below:

64-bit: Input a 10-digit hexadecimal value (0~9, a~f). For 
example: 01234abcde

128-bit: Input a 26-digit hexadecimal value (0~9, a~f). For 
example: 0123456789abcdef0123456789

Содержание USB511WB

Страница 1: ...11 Mbits sec USB 802 11b Wireless Mini Adapter USB511WB Instruction Guide The Professionals Source For Hard to Find Computer Parts WIRELESS LAN USB ADAPTER Actual product may vary from photo...

Страница 2: ...mum 20cm 8 inches spacing must be provided between computer mounted antenna and a person s body including extremities of hands wrists and feet during wireless modes of operation R TTE Compliance State...

Страница 3: ...ings 5 WEP Key Settings 7 Advanced Settings 8 Troubleshooting 9 Appendix A Installation Considerations 10 Appendix B Setting Up a Wireless Ad Hoc Network 11 Appendix C Setting up an Infrastructure Net...

Страница 4: ...dard Uses high speed data transfer rate up to 11 Mbits sec Plugs directly into USB port without cables Supports 64 128 bit WEP Data Encryption for high security Supports peer to peer communication bet...

Страница 5: ...Utility folder and run setup exe 2 Click Next 3 Choose the location where you want the application installed and click Next Windows will complete the rest of the installation automatically Note If Wi...

Страница 6: ...ble click on the name of the device or click on the name of the device and press the Connect to this site button Current Network Displays information about the wireless network the card is connecting...

Страница 7: ...haracters If you specify an SSID for the device it must be the same as the other wireless stations you want to connect to Any If you check the Any box the adapter will survey and connect to an availab...

Страница 8: ...e active immediately Write Current Settings to Writes the current setting values to a file with the name Profile you entered in the profile box For example to save your current settings as Test enter...

Страница 9: ...key identified are allowed to connect with each other Set up the same key with each wireless adapter you want to connect to Auto Auto switch the authentication algorithm depending on the wireless sta...

Страница 10: ...r s transmission rate Fragmentation Threshold Defines the maximum size of a packet Any packet larger than this value will be fragmented If you have decreased this value and are experiencing high packe...

Страница 11: ...s point If you are in Infrastructure mode make sure that the same SSID is specified for each wireless client and access point In Ad Hoc mode make sure both wireless clients have the same SSID If you h...

Страница 12: ...wireless signal must cross through also affects its range A solid metal door or concrete wall can decrease the signal s range Whenever possible position the adapters so that the signal can pass throug...

Страница 13: ...on utility set each adapter to Ad Hoc mode and make sure that both adapters are on the same Channel and have the same SSID see Configuration on page 5 and 6 for details 4 From your operating system so...

Страница 14: ...N ports using an Ethernet cable Use the access point s instruction guide for installation details 2 Install your wireless adapters including their drivers and utility programs using the instructions p...

Страница 15: ...string of bits to perform the calculations The larger the key most are 64 or 128 bits in length the more difficult to break the code ESS Extended Service Set In Infrastructure mode the ESS consists of...

Страница 16: ...dresses for use within a particular network Also known as a network mask WAN Wide Area Network A network that connects computers in geographically separated areas The Internet is an example of a WAN W...

Страница 17: ...c DBPSK 1 Mbit sec Radio Technology Direct Sequence Spread Spectrum DSSS Media Access Control CSMA CA Security 64 128 bit WEP Encryption Supported OS Windows 98SE Me 2000 XP LED Indicators Link Activi...

Страница 18: ...his product is backed by a lifetime warranty In addition StarTech com warrants its products against defects in materials and workmanship for the periods noted below following the initial date of purch...

Страница 19: ...Revised May 28 2004...

Отзывы: