User's Manual
Table Of Contents
- Table of Contents
- Section 1
- Section 2
- Section 3
- Installation and Configuration Procedures Under Windows 98/Me/2000
- 3.1 What You Need to Know About Windows 98/Me/2000
- 3.2 What You Will Need
- 3.3 Installing the Application and Drivers Under Windows 98/Me/2000
- 1. Insert the Firmware and Software Tools CD into your CD-ROM drive and locate the executable fil...
- 2. Follow the installation instructions from the InstallShield Wizard by pressing the “Next” button.
- 3. During the setup process, the window of Figure 3-1 will appear prompting you to select the ada...
- Figure 3-1. Selection of adapter type
- Figure 3-2. Operating Mode Dialog
- Figure 3-3. ESSID and Channel Dialog
- Figure 3-4. Operating Mode Dialog
- Figure 3-5. ESSID Dialog
- 1. Insert the Firmware and Software Tools CD into your CD-ROM drive and locate the executable fil...
- 3.4 Uninstall Procedure Under Windows 98/Me
- 3.5 Uninstall Procedure Under Windows 2000
- Section 4
- Section 5
Configuration & Monitor Utility
4-5
Encryption
By choosing this option in any of the two modes, you can set four different WEP keys
and specify which one of them to use. First, either enable or disable encryprion from the
appropriate “Encryption” field (see Figure 4-5 below). If you decide to use encryption,
you can choose any of the available WEP keys (1 to 4). You also have the option to
select the WEP mode (Mandatory/Optional). If you select “Mandatory”, then not only
WEP will be used, but also any other station needs to use WEP encryption in order to
establish a communication with your station. This requirement is in line with the IEEE
802.11b standard. If, on the other hand, you choose “Optional”, then your station can
communicate with every other station regardless if they use WEP or not. Please keep in
mind that the WEP keys must be in HEX format. Finally, you have the option to select
whether
Open System
or
Shared Key
authentication will be used. In order to take effect
the changes you wish to make, press the “Submit” button at the bottom of the screen.
Figure 4-5.
Encryption