User's Manual

Chapter 6 Wireless Adapter Utility Configuration
40
For the rest of the workstations
Refer to the steps for configuring PC2.
If your other wireless clients are not using the USB adapter, you may refer
to the manual of these other adapters for details on Ad-hoc
configuration.
For details on other authentication and encryption types, kindly refer to
Chapter 7 “Types of Authentication and Encryption mode”