Cisco WUSB54GR-UK User's Guide Page 16

  • Download
  • Add to my manuals
  • Print
  • Page
    / 65
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 15
10
Chapter 4: Setting up and Connecting the Wireless-G Network Adapter with RangeBooster
Setting up the Adapter
Wireless-G USB Network Adapter with RangeBooster
2. If your network has the wireless security WEP (Wired Equivalent Privacy) enabled, this screen will appear.
Select 64-bit or 128-bit.
Then enter your network devices’ passphrase or manually enter the WEP key.
Passphrase - Enter a passphrase in the Passphrase field, so a WEP key is automatically generated. The
passphrase is case-sensitive and should not be longer than 16 alphanumeric characters. It must match the
passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If
you have any non-Linksys wireless products, enter the WEP key manually on those products.)
WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption,
enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26 hexadecimal characters.
Valid hexadecimal characters are “0” to “9” and “A” to “F”.
Then click Connect and proceed to Step 3.
If your network has the wireless security WPA Personal (Wi-Fi Protected Access) enabled, this screen will
appear.
Encryption - Select your network devices’ type of algorithm, TKIP or AES, from the Encryption drop-down
menu.
Passphrase - Enter enter your network devices’ passphrase, also called a pre-shared key, of 8-63 characters
in the Passphrase field.
Then click Connect and proceed to Step 3.
Figure 4-5: WEP Key Needed for Connection
Figure 4-6: WPA - Personal Needed for Connection
encryption: encoding data transmitted in a network.
wpa (wi-fi protected access: a wireless security protocol
using TKIP (Temporal Key Integrity Protocol) encryption,
which can be used in conjunction with a RADIUS server.
wep (wired equivalent privacy): a method of encrypting network
data transmitted on a wireless network for greater security.
Page view 15
1 ... 15 16 17 ... 65

Comments to this Manuals

No comments