You can now store four codes in the lower section of the window. The selected code is always used.
64 bit or 128 bit encryption is supported. 128 bit encryption is more secure. First select whether you want to
use Hex (allows characters from 0-9 and a-f to be used) or ASCII characters (You can use any characters).
The setting and the selection of either 64 or 128 bit encryption determines the length of the code to be
entered.
WEP 64 bit ASCII requires 5 characters
WEP 64 bit HEX requires 10 characters
WEP 128 bit ASCII requires 13 characters
WEP 128 bit HEX requires 26 characters
Examples:
64 bit Hex (10 characters) = 231074a6ef
64 bit ASCII (5 characters) = j31n.
128 bit Hex (26 characters) = 231074a6b9773ce43f91a5bef3
128 bit ASCII (13 characters) = urlaub2006.+0
3.2.2.2 WPA/WPA2 encryption
Wi-Fi Protected Access (WPA) is an encryption method for WLAN. WPA contains the WEP architecture,
but offers additional protection via dynamic codes, which are based on the Temporal Key Integrity Protocol
(TKIP), and also offers pre-shared keys (PSK) or extensible authentication protocol (EAP) for user
authentication. However, a radius server is required for this. WPA2 is a development of WPA and uses a
different encryption algorithm, advanced encryption standard (AES).
WPA offers two types of authentication, either pre-shared key or authentication via special authentication
protocols, which are generally variations of EAP (Extensible Authentication Protocol). An authentication
server (RADIUS server) is used for the latter authentication method, which is rarely used for private
applications. Your administrator can give you the information you require to confi gure this authentication
method.
The pre-shared key method is more common and offers a high degree of security.
To use WPA encryption, select WPA-PSK under
Authentication type and TKIP under Encryption.
Now enter the code used in the WPA preshared key fi eld.
The code entered must be absolutely identical with that
used in the network. It must be min. 8 and max. 63 random
characters for ASCII. Letters, numbers and special
characters can be used. 64 characters are required for
HEX, whereby only characters from 0-9 and a-f can be
used. If you do not have this code, it can be found in your
router/access point or you can ask the person responsible
for these devices.
Save the settings and click OK.
Downloaded from
www.Manualslib.com
8
manuals search engine
To use WPA2 encryption, select WPA2-PSK under
Authentication type and AES under Encryption.
Now enter the code used in the WPA preshared key fi eld.
The code entered must be absolutely identical with that
used in the network. It must be min. 8 and max. 63 random
characters for ASCII. Letters, numbers and special
characters can be used. 64 characters are required for
HEX, whereby only characters from 0-9 and a-f can be
used. If you do not have this code, it can be found in your
router/access point or you can ask the person responsible
for these devices.
Save the settings and click OK.
To activate the profi le created, switch to the Profi les tab, select the profi le and then click Activate.
4. Confi guring the operating system and computer (Windows®)
After you have successfully installed the network adapter, you still have to install or confi gure a protocol. This
protocol governs the data exchange between the computer and the network. TCP/IP is most common. Each
computer has to be assigned its own address for the protocol. Automatic address assignment is only reliable
if a DHCP server exists in the network, e.g. a router or access point. If you have one of these devices with a
DHCP function, you should leave the setting on "Get automatically".
Proceed as follows to check the settings on your PC:
Start -> Settings -> Control panel -> Network connections
Select the connection (network adapter) via which your
PC is connected to the router, e.g. "LAN connection".
When you right-click the corresponding connection, the
following screen is displayed when you select Properties.
Select the Internet Protocol (TCP/IP) entry in the list and
click Properties.
9