User's Manual
11. Wireless Security Password (Encryption Key): Enter the wireless network Password
(WEP Key). The Password is the same value used by the wireless access point or router.
Contact your administrator for this password.
● Pass phrase (64-bit): Enter five (5) alphanumeric characters, 0-9, a-z, or A-
Z.
● Hex key (64-bit): Enter 10 hexadecimal characters, 0-9, A-F.
● Pass phrase (128-bit): Enter 13 alphanumeric characters, 0-9, a-z, or A-Z.
● Hex key (128-bit): Enter 26 hexadecimal characters, 0-9, A-F.
12. Key Index: Select 1, 2, 3, or 4. Up to four passwords may be specified by changing the
Key Index.
To change the security settings:
1. Click Profiles on the Intel PROSet/Wireless main window. The network that you just
connected to is listed in the Profiles list.
2. Select the wireless network.
3. Click Properties to open the Wireless Profile Properties General Settings. The Wireless
Network Name (SSID) and Profile Name are already defined. Device to Device (ad
hoc) is selected as the operating mode.
4. Click Next to access the Security Settings.
5. Click Enterprise Security.
6. Network Authentication: Open is the default. No authentication is used.
7. Data Encryption: WEP is selected. You can change the WEP key, key index or encryption
level.
8. Click OK to return to the Profiles list after you have completed your changes.
Enterprise Security: Configure Profiles for Infrastructure
Networks
An infrastructure network consists of one or more access points and one or more computers
with wireless adapters installed. Each access point must have a wired connection to a wireless
network.
Set up a Client with No Authentication or Data Encryption (None)
On the Intel(R) PROSet/Wireless main page, select one of the following methods to connect to
an Infrastructure network:
● Double-click an Infrastructure network in the Wireless Networks list.
● Select an Infrastructure network in the Wireless Networks list. Click Connect. The Intel
PROSet/Wireless software automatically detects the security settings for the wireless
adapter.
If there is no authentication required, the network connects without a prompt to enter any log-