Wireless-G Notebook Adapter with SpeedBooster
If your wireless network doesn't have wireless security, select Disabled and then click the Next button to
continue. Proceed to Step 5.
If your wireless network has wireless security, select the method of security used: WEP, WPA-Personal,
WPA-Enterprise, RADIUS, or LEAP. WEP stands for Wired Equivalent Privacy, and WPA stands for Wi-Fi
Protected Access. WPA is a stronger security method than WEP. RADIUS stands for Remote Authentication
Dial-In User Service, and LEAP stands for Lightweight Extensible Authentication Protocol. Click the Next
button to continue or the Back button to return to the previous screen.
4. Proceed to the appropriate section for your security method: WEP, WPA-Personal, WPA-Enterprise, RADIUS, or
LEAP.
WEP
WEP - Select 64-bit or 128-bit encryption
Passphrase - Enter a passphrase in the Passphrase field, so a WEP key is automatically generated. It is case-
sensitive and should not be longer than 16 alphanumeric characters. This passphrase must match the
passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If
you have any non-Linksys wireless products, enter the WEP key manually on those products.)
WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption,
enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26 hexadecimal characters.
Valid hexadecimal characters are "0" to "9" and "A" to "F".
Advanced Users
TX Key - The default transmit key number is 1. If your network's access point or wireless router uses transmit
key number 2, 3, or 4, select the appropriate number from the TX Key drop-down box.
Authentication -The default is set to Auto, so it will auto-detect for Shared Key or Open System
authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for
authentication. For Open System authentication, the sender and the recipient do not share a WEP key for
authentication. If you are not sure which authentication method to select, keep the default, Auto.
Click the Next button to continue, or click the Back button to return to the previous screen.
Chapter 5: Using the Wireless Network Monitor
Click Exit to close the Setup Wizard.
Figure 5-29: Ad-Hoc Mode Settings for New Profile
Figure 5-30: Wireless Security for New Profile
34