User's Manual
Table Of Contents
- Use the Intel® PROSet/Wireless WiFi Connection Utility
- Contents
- Use the Intel® PROSet/Wireless WiFi Connection Utility
- Taskbar Icon
- Get Connected
- WiFi Networks List
- Connection Status Icons
- Network Properties
- Network Connection Details
- Intel® Wireless Troubleshooter
- Application Settings (Tools menu)
- Turn Wireless Radio On or Off
- Adapter Settings
- Advanced Statistics (Advanced menu)
- Profile Management
- Profile Wizard General Settings
- Wireless Network Overview
- Security Overview
- Personal Security
- Enterprise Security
- Using the Administrator Tool
- Intel® Wireless Troubleshooter (Tools menu)
- Regulatory Information
- Specifications
- Customer Support
- Warranty Information
- Glossary
General Settings Select to open the Personal Security Settings. The security settings
that are available are dependent on the Operating Mode selected in
the Create WiFi Profile Security Settings.
Device to Device (ad hoc): In device to device mode, also called ad
hoc mode, wireless computers send information directly to other
wireless computers. You can use ad hoc mode to connect multiple
computers in a home or small office, or to set up a temporary wireless
network for a meeting.
NOTE: Device to Device (ad hoc) networks are identified
with a notebook image (
) in the WiFi Networks and
Profiles list.
Network (Infrastructure): An infrastructure network consists of
one or more access points and one or more computers with WiFi
adapters installed. At least one access point should also have a wired
connection. For home users, this is usually a broadband or cable
network.
NOTE: Infrastructure networks are identified with an
access point image (
) in the WiFi Networks and Profiles
list.
Security
Settings
If you are configuring a Device to Device (ad hoc) profile, select one of
the following data encryption settings:
● None: No authentication required.
● WEP-64 bit or WEP-128 bit: A network key or password is used
for encryption.
If you are configuring a Network (Infrastructure) profile, select:
● WPA*-Personal (TKIP) or WPA2*-Personal (TKIP): WPA-Personal
uses the Temporal Key Integrity Protocol (TKIP) for data
encryption.
● WPA-Personal (AES-CCMP) or WPA2-Personal (AES-CCMP):
WPA-Personal uses a new method for privacy protection of
wireless transmissions specified in the IEEE 802.11i standard.