Figure 4-5: Wep Key Needed For Connection; Figure 4-6: Wpa - Personal Needed For Connection - Linksys WUSB54GR User Manual

2.4ghz 802.11g wireless-g usb network adapter with rangebooster
Hide thumbs Also See for WUSB54GR:
Table of Contents

Advertisement

Wireless-G USB Network Adapter with RangeBooster
2. If your network has the wireless security WEP (Wired Equivalent Privacy) enabled, this screen will appear.
Select 64-bit or 128-bit.
Then enter your network devices' passphrase or manually enter the WEP key.
Passphrase - Enter a passphrase in the Passphrase field, so a WEP key is automatically generated. The
passphrase is case-sensitive and should not be longer than 16 alphanumeric characters. It must match the
passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If
you have any non-Linksys wireless products, enter the WEP key manually on those products.)
WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption,
enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26 hexadecimal characters.
Valid hexadecimal characters are "0" to "9" and "A" to "F".
Then click Connect and proceed to Step 3.
If your network has the wireless security WPA Personal (Wi-Fi Protected Access) enabled, this screen will
appear.
Encryption - Select your network devices' type of algorithm, TKIP or AES, from the Encryption drop-down
menu.
Passphrase - Enter enter your network devices' passphrase, also called a pre-shared key, of 8-63 characters
in the Passphrase field.
Then click Connect and proceed to Step 3.
Chapter 4: Setting up and Connecting the Wireless-G Network Adapter with RangeBooster
Setting up the Adapter

Figure 4-5: WEP Key Needed for Connection

Figure 4-6: WPA - Personal Needed for Connection

wep (wired equivalent privacy): a method of encrypting network
data transmitted on a wireless network for greater security.
encryption: encoding data transmitted in a network.
wpa (wi-fi protected access: a wireless security protocol
using TKIP (Temporal Key Integrity Protocol) encryption,
which can be used in conjunction with a RADIUS server.
10

Advertisement

Table of Contents
loading

Table of Contents