User manual
29
Chapter 3 Configuration
alphanumeric or hexadecimal characters. When you click one of these
buttons, the cursor appears next to Key 1.
• For 64-bit encryption, type exactly 5 alphanumeric or 10 hexadec-
imal characters in each of the four key fields.
• For 128-bit encryption, type exactly 13 alphanumeric or 26 hexa-
decimal characters.
Then click the Apply button to create your encryption keys. After you
click Apply, the configuration utility uses asterisks to mask your keys.
The Use WEP Key field lets you specify which of the four encryption
keys you use to transmit data on your wireless network. You can
change the default key by clicking on the down arrow at the right of this
field, selecting the number of the key you want to use and clicking the
Apply button. As long as the Access Point or station with which you are
communicating has the same key in the same position, you can use any
of the keys as the default.
Creating Encryption Keys Using a Passphrase
To create encryption keys using a passphrase, click Create Key with
Passphrase and type a character string in the Passphrase field. As
you type, the configuration utility displays asterisks to mask your
passphrase and uses an algorithm to generate four keys used for
encryption. Using a passphrase to generate the four keys makes it easy
to set the same keys for all members of your wireless network.
IBSS Channel Selection (IBSS Tab)
When communicating in a peer-to-peer network, you can use the IBSS
tab to specify a channel on which you prefer communications to take
place. Just click on the channel in the IBSS Channel Selection field,
then click the Apply button.
The channel you select is not necessarily the channel on which peer-to-
peer communications will be established. If the IBSS network names
(SSID) are the same for nodes in the peer-to-peer network, but have
different preferred channels, a network can still be established. In this
case, if it cannot find a network with the specified network name on the
preferred channel, a station will scan other channels until it finds a peer-
to-peer network with the specified network name on which to communi-