User's Manual
Table Of Contents
- Intel(R) PROSet/Wireless WiFi Connection Utility User's Guide
- Use the Intel(R) PROSet/Wireless WiFi Connection Utility
- Main Window
- Taskbar Icon and Menu Commands
- Connection Status Icons
- Wireless Network Overview
- Connect to a WiFi Network
- Network Connection Details
- Network Properties
- Personal Security
- Use Wi-Fi Protected Setup*
- Turn Wireless Radio On or Off
- Application Settings (Tools menu)
- Administrator Tool
- Adapter Settings
- Advanced Statistics (Advanced menu)
- Exclude List Management
- Profile Management
- Profile Wizard General Settings
- Security Overview
- Enterprise Security
- Application Settings (Administrator Tool)
- Administrator Password
- Advanced Settings
- Set up Profile Security
- Configure Profiles for Network (Infrastructure) Operating Mode
- Administrator Tool Settings
- Intel(R) Wireless Troubleshooter (Tools menu)
- Manual Diagnostics Tool
- Wireless Event Viewer
- Regulatory Information
- Specifications
- Customer Support
- Warranty Information
- Glossary
WEP encryption provides two levels of security:
● 64-bit key (sometimes referred to as 40-bit)
● 128-bit key (also known as 104-bit)
For improved security, use a 128-bit key. If you use encryption, all wireless devices on your
wireless network must use the same encryption keys.
You can create the key yourself and specify the key length (64-bit or 128-bit) and key index
(the location that a specific key is stored). The greater the key length, the more secure the
key. When the length of a key is increased by one character, the number of possible keys
doubles.
Key Length: 64-bit
Pass phrase (64-bit): Enter five (5) alphanumeric characters, 0-9, a-z or A-Z.
Hex key (64-bit): Enter 10 hexadecimal characters, 0-9, A-F.
Key Length: 128-bit
Pass phrase (128-bit): Enter 13 alphanumeric characters, 0-9, a-z or A-Z.
Hex key (128-bit): Enter 26 hexadecimal characters, 0-9, A-F.
With WEP data encryption, wireless station can be configured with up to four keys (the key
index values are 1, 2, 3, and 4). When an access point or a wireless station transmits an
encrypted message that uses a key stored in a specific key index, the transmitted message
indicates the key index that was used to encrypt the message body. The receiving access
point or wireless station can then retrieve the key that is stored at the key index and use it
to decode the encrypted message body.
Set up a Client with Open Authentication and No Data Encryption
(None)
CAUTION: WiFi networks using no authentication or encryption are highly vulnerable to
access by unauthorized users.
On the Intel(R) PROSet/Wireless WiFi main window, use one of the following methods to
connect to a device to device network:
● Double-click a Device to Device (ad hoc) network in the WiFi Networks list.
● Select a Device to Device (ad hoc) network in the WiFi Networks list. Click Connect.
The Intel(R) PROSet/Wireless WiFi Connection Utility automatically detects the