Efficient Networks EEE 802.11b/g Wireless USB 2.0 Adapter User Manual

Page 19

Advertising
background image

IEEE 802.11b/g Wireless USB 2.0 Adapter

Version 1.2

19

you may associate with your network. This feature comes in handy when
you need to work at several locations where there are different network
settings. Using this you can configure a different profile for each of your
networks.

h Client Name: Enter any name to describe the profile.
h SSID1: Enter the SSID of the network. The SSID is a unique name

shared among all points in your wireless network. The SSID must be
identical for all points in the network, and is case-sensitive.

h Click

on

the

OK button to continue.

3.2.3 Security


The next tab displayed is the Security tab. Here you can configure the
authentication and encryption method that is used on your network. There are
five types of security methods available: none, WPA, WPA-PSK, 802.1x, Pre-
shared WEP key. The configuration steps for each method are described below.

3.2.3.1 Security

Disabled


If your network does not require any security methods, then select None in the
security tab, and then click on the OK button.


3.2.3.2

WPA – TLS, TTLS


WPA (Wi-Fi Protected Access) was designed to improve upon the security
features of WEP (Wired Equivalent Privacy). The technology is designed to work
with existing Wi-Fi products that have been enabled with WEP. WPA provides
improved data encryption through the Temporal Integrity Protocol (TKIP), which
scrambles the keys using a hashing algorithm and by adding an integrity-

Advertising