Detailed instructions for use are in the User's Guide.
[. . . ] 802. 11g Wireless LAN Mini USB Adapter
User Manual
Version: 2. 0 (August, 2004)
COPYRIGHT
Copyright © 2004/2005 by this company. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of this company This company makes no representations or warranties, either expressed or implied, with respect to the contents hereof and specifically disclaims any warranties, merchantability or fitness for any particular purpose. Any software described in this manual is sold or licensed "as is". Should the programs prove defective following their purchase, the buyer (and not this company, its distributor, or its dealer) assumes the entire cost of all necessary servicing, repair, and any incidental or consequential damages resulting from any defect in the software. [. . . ] W PA takes over automatically from that point, keeping unauthorized users that don't have the matching password from joining the network, while encrypting the data traveling between authorized devices. Note: W PA and WPA-PSK modes do not enable in Ad Hoc network.
Change/Apply
Click "Change" will enable you to setup the parameters of "General Connection Setting". In the meantime, the button will change to "Apply" for you to confirm your settings.
13
Parameter Encryption Setting W EP Encryption Key Setting
Description In the block, users setup W EP and WPA functions. Please refer to Section 3. 3 for the details.
W PA Encryption Setting Click this button to setup the W PA function. To connect to the network without making additional configuration, you can load the profile. Load Load the setting values from the file in the "Profile Name" list. Save Current Input a file name and click "Save Current" to write the current setting values to be a profile in the "Profile Name" list. Delete Other Advanced Setting For more advanced setting, please click it. Information To view the version of the driver, firmware and the MAC Address of the adapter, click the button. Delete the profile you select.
3. 3
WEP and WPA Encryption
WEP is an data encryption algorithm, which protects Wireless LAN data in the network against eavesdropping. The adapter supports W PA (Wi-Fi Protected Access) that combines IEEE 802. 1x and TKIP (Temporal Key Integrity Protocol) technologies. Client users are required to authorize before accessing to Aps or AP Routers, and the data transmitted in the network is encrypted/decrypted by a dynamically changed secret key. This adapter has built-in AES engine which ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802. 11i for the security in the wireless network.
14
3. 3. 1 WEP Setting
Parameter Key Length
Description You may select the 64-bit, 128-bit or 256-bit to encrypt transmitted data. Larger key length will provide higher level of security, but the throughput will be lower.
Default Key ID Key Format
Select one of the keys (1~4) as the encryption key. Hexdecimal Only "A-F", "a-f" and "0-9" are allowed to be set as WEP key. ASCII Numerical values, characters or signs are allowed to be the WEP key. It is more recognizable for user.
Key1 ~ Key4
The keys are used to encrypt data transmitted in the wireless network. 64-bit Input 10-digit Hex values or 5-digit ASCII values as the encryption keys. 128-bit Input 26-digit Hex values or 13-digit ASCII values as the encryption keys. For example: "01234567890123456789abcdef" or "administrator". 256-bit Input 58-digit Hex values or 29-digit ASCII values as the encryption keys.
Change/Apply
Click "Change" will enable you to setup the WEP key. In the meantime, the button will change to "Apply" for you to confirm your settings.
15
3. 3. 2 WPA Setting
The adapter can automatically detect the WPA setting of the AP which the adapter chooses to connect from the "Available Network" list. [. . . ] Infrastructure is applicable to enterprise scale for wireless access to central database, or wireless application for mobile workers. What is BSS ID A specific Ad hoc LAN is called a Basic Service Set (BSS). What is WEP WEP is W ired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 . 11 standard. TKIP is a quick-fix method to quickly overcome the inherent weaknesses in W EP security, especially the reuse of encryption keys. [. . . ]