User's Manual
Table Of Contents
- Intel(R) PROSet/Wireless WiFi Connection Utility User's Guide
- Use the Intel(R) PROSet/Wireless WiFi Connection Utility
- Main Window
- Taskbar Icon and Menu Commands
- Connection Status Icons
- Wireless Network Overview
- Connect to a WiFi Network
- Network Connection Details
- Network Properties
- Personal Security
- Use Wi-Fi Protected Setup*
- Turn Wireless Radio On or Off
- Application Settings (Tools menu)
- Administrator Tool
- Adapter Settings
- Advanced Statistics (Advanced menu)
- Exclude List Management
- Profile Management
- Profile Wizard General Settings
- Security Overview
- Enterprise Security
- Application Settings (Administrator Tool)
- Administrator Password
- Advanced Settings
- Set up Profile Security
- Configure Profiles for Network (Infrastructure) Operating Mode
- Administrator Tool Settings
- Intel(R) Wireless Troubleshooter (Tools menu)
- Manual Diagnostics Tool
- Wireless Event Viewer
- Regulatory Information
- Specifications
- Customer Support
- Warranty Information
- Glossary
Data Encryption
AES-CCMP
Advanced Encryption Standard - Counter CBC-MAC Protocol. The new method for privacy
protection of wireless transmissions specified in the IEEE 802.11i standard. AES-CCMP
provides a stronger encryption method than TKIP. Choose AES-CCMP as the data encryption
method whenever strong data protection is important. AES-CCMP is available with WPA/
WPA2 Personal/Enterprise network authentication.
NOTE: Some security solutions may not be supported by your computer's operating system
and may require additional software or hardware as well as wireless LAN infrastructure
support. Check with your computer manufacturer for details.
TKIP
Temporal Key Integrity Protocol provides per-packet key mixing, a message integrity check,
and a rekeying mechanism. TKIP is available with WPA/WPA2 Personal/Enterprise network
authentication.
CKIP
See
CKIP.
WEP
Wired Equivalent Privacy (WEP) uses encryption to help prevent unauthorized reception of
wireless data. WEP uses an encryption key to encrypt data before transmitting it. Only
computers that use the same encryption key can access the network and decrypt the data
transmitted by other computers. Enterprise WEP is not exactly the same as personal WEP, in
that you can select Open network authentication and then click Enable 802.1X and be able
to choose from all client authentication types. The selection of authentication types are not
available under personal WEP.
Authentication Types
TLS
A type of authentication method using the Extensible Authentication Protocol (EAP) and a
security protocol called the Transport Layer Security (TLS). EAP-TLS uses certificates which