User's Manual
Table Of Contents
- Intel(R) PROSet/Wireless WiFi Connection Utility User's Guide
- Use the Intel(R) PROSet/Wireless WiFi Connection Utility
- Main Window
- Taskbar Icon and Menu Commands
- Connection Status Icons
- Wireless Network Overview
- Connect to a WiFi Network
- Network Connection Details
- Network Properties
- Personal Security
- Use Wi-Fi Protected Setup*
- Turn Wireless Radio On or Off
- Application Settings (Tools menu)
- Administrator Tool
- Adapter Settings
- Advanced Statistics (Advanced menu)
- Exclude List Management
- Profile Management
- Profile Wizard General Settings
- Security Overview
- Enterprise Security
- Application Settings (Administrator Tool)
- Administrator Password
- Advanced Settings
- Set up Profile Security
- Configure Profiles for Network (Infrastructure) Operating Mode
- Administrator Tool Settings
- Intel(R) Wireless Troubleshooter (Tools menu)
- Manual Diagnostics Tool
- Wireless Event Viewer
- Regulatory Information
- Specifications
- Customer Support
- Warranty Information
- Glossary
General Settings Select to open the Personal Security Settings. The security settings
that are available are dependent on the Operating Mode selected in
the Create WiFi Profile Security Settings.
Device to Device (ad hoc): In device to device mode, also called ad
hoc mode, wireless computers send information directly to other
wireless computers. You can use ad hoc mode to connect multiple
computers in a home or small office, or to set up a temporary wireless
network for a meeting.
NOTE: Device to Device (ad hoc) networks are identified
with a notebook image (
) in the WiFi Networks and
Profiles list.
Network (Infrastructure): An infrastructure network consists of
one or more access points and one or more computers with WiFi
adapters installed. At least one access point should also have a wired
connection. For home users, this is usually a broadband or cable
network.
NOTE: Infrastructure networks are identified with an
access point image (
) in the WiFi Networks and Profiles
list.
Security
Settings
If you are configuring a Device to Device (ad hoc) profile, select one of
the following data encryption settings:
● None: No authentication required.
● WEP-64 bit or WEP-128 bit: A network key or password is used
for encryption.
If you are configuring a Network (Infrastructure) profile, select:
● WPA*-Personal (TKIP) or WPA2*-Personal (TKIP): WPA-Personal
uses the Temporal Key Integrity Protocol (TKIP) for data
encryption.
● WPA-Personal (AES-CCMP) or WPA2-Personal (AES-CCMP):
WPA-Personal uses a new method for privacy protection of
wireless transmissions specified in the IEEE 802.11i standard.