Samsung P28 Manual page 48

Hide thumbs Also See for P28:
Table of Contents

Advertisement

5. When an encryption key is configured for an access point or peer-to-peer net-
N
N
6. When your computer is connected to an access point, the connection (
N
N
To create an Ad Hoc network
To create a new computer-to-computer (Ad Hoc) network or to connect to a hidden
access point (Stealth/Closed Mode), refer to the following procedures.
N
N
1. Click on Add / Edit Preferred Profiles in the Action menu.
2. Click on Add in My Preferred Network Profiles.
3. Select Create a new network profile and click OK.
4. Enter a Profile Name and Network Name.
5. In the Wireless network key (WEP) field, select Enable Encryption and enter
N
N
6. When a profile has been created, the new profile is added to the My Proferred
Manual
4-16
work, select Enable Encryption in the wireless network key (WEP) field, enter
the corresponding encryption key and then click OK.
o
t
e
o
t
e
For information about the encryption key (WEP key) of your AP, ask your AP
administrator or network administrator.
A network key consists of either 5 or 13 alphanumeric characters(e.g. magic),
or 10 or 26 hexadecimal(0-9 or A-F).
appears in front of the added wireless network connection profile name.
o
t
e
o
t
e
When a profile is created, the new profile is added to the My Preferred
Network Profiles list. Double-clicking the profile displays Activate or Edit a
Preferred Profile window. Select Activate Profile and the click on OK to make
a connection using the profile.
o
t
e
o
t
e
A hidden access point is an access point that exists, but is configured not to
be detected by the scan operation to prevent access attempts from unautho-
rized users.
To create a new Ad hoc network, select a Peer-to-Peer group in Create Network.
In this case, you can select the channel to use.
the encryption key to be used for the network and then click OK.
To connect to the access point, enter the network encryption key configured in the
access point and then click OK.
o
t
e
o
t
e
It is recommended configuring data encryption for security purposes when
creating an Ad Hoc network profile. For more information about security con-
figuration, refer to the Security Setting of connection to an Access Point or the
online Help.
Network Profiles list. To connect to the Ad Hoc network, select and double-click
on the Profile Name. Then the Activate or Edit a Preferred Profile window
appears. Select Activate Profile and then click OK.
)icon

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents