User's Manual
Table Of Contents
- Use the Intel® PROSet/Wireless WiFi Connection Utility
- Contents
- Use the Intel® PROSet/Wireless WiFi Connection Utility
- Taskbar Icon
- Get Connected
- WiFi Networks List
- Connection Status Icons
- Network Properties
- Network Connection Details
- Intel® Wireless Troubleshooter
- Application Settings (Tools menu)
- Turn Wireless Radio On or Off
- Adapter Settings
- Advanced Statistics (Advanced menu)
- Profile Management
- Profile Wizard General Settings
- Wireless Network Overview
- Security Overview
- Personal Security
- Enterprise Security
- Using the Administrator Tool
- Intel® Wireless Troubleshooter (Tools menu)
- Regulatory Information
- Specifications
- Customer Support
- Warranty Information
- Glossary
Network Authentication
If you configure a profile for Device to Device (ad hoc)
networking, the default setting is
Open authentication.
If you configure a profile for an infrastructure network, select:
● Open: Any wireless station can request authentication.
● Shared: Uses an encryption key known only to the
receiver and sender of data.
● WPA-Personal or WPA2-Personal: Uses a password also
called a pre-shared key (PSK).
● WPA-Enterprise or WPA2-Enterprise: Use on enterprise
networks with an 802.1X RADIUS server.
NOTE: WPA-Enterprise and WPA2-Enterprise are
interoperable.
Data Encryption
Click to open the following data encryption types:
● None: No encryption.
● WEP: WEP encryption provides two levels of security
that use a 64-bit key (sometimes referred to as 40-bit)
or a 128-bit key (also known as 104-bit). If you use
encryption, all wireless devices on your wireless
network must use the same encryption keys.
● CKIP: Cisco Key Integrity Protocol is a Cisco proprietary
security protocol for encryption in 802.11 media. CKIP
uses Key Permutation (KP) and Message Sequence
Number to improve 802.11 security in infrastructure
mode.
● TKIP: Provides per-packet key mixing, a message
integrity check and a rekeying mechanism.
● AES-CCMP: (Advanced Encryption Standard - Counter
CBC-MAC Protocol) Used as the data encryption method
whenever strong data protection is important.