Specifications

Configuring Clients in an Infrastructure Network
5-8 Configuring the Wireless Network
10. Leave Medium Reservation disabled (no check mark) unless you have a hidden station
problem as described in the “Configuring the RTS/CTS Protocol” section on page
5-24.
11. To change the default power management parameters, click the Power Management
tab. For information on modifying the power management settings, see the
“Configuring Power Management” section on page 5-25.
12. If the Access Point is using encryption, click the Encryption tab. By default,
encryption is disabled. To enable encryption:
a) Place a check mark in the Enable Encryption check box.
b) Find out the keys used by the Access Points in the wireless network. In addition,
you need to know the position (1, 2, 3, or 4) for each key. The RoamAbout devices
can support up to four keys.
c) Enter the keys in the Encryption Key fields. Make sure that the key you enter in
position 1 is the same as the key in position 1 in the Access Point. Also, any keys
entered in positions 2, 3, and 4 must match the keys in those same positions in the
Access Point. However, you do not need to enter all the keys used by the Access
Point.
If you leave then return to the Encryption window, the characters in each Key field
are replaced by asterisks (*) that fill the field.
d) In the Encrypt Data Transmissions using field, select which key you want the
client to use when transmitting data.
Refer to the “Setting Encryption” section on page 5-27 for additional information.
13. Click OK to close the Properties window, and restart the computer when prompted.