Figure 4-5: Wep Key Needed For Connection; Figure 4-6: Wpa Personal Needed For Connection - Linksys WPC300N (EU/LA) User Manual

2,4ghz wireless-n notebook adapter
Hide thumbs Also See for WPC300N (EU/LA):
Table of Contents

Advertisement

Wireless-N Notebook Adapter
2. If your network has WEP, WPA Personal, or WPA2 Personal wireless security enabled, then that security
screen will appear. Continue to the screen for your wireless security.
• WEP (Wired Equivalent Privacy)
If you have WEP enabled, this screen will appear. Select 64-bit or 128-bit. Then enter a passphrase or
WEP key.
Passphrase - Enter a passphrase in the Passphrase field, so a WEP key is automatically generated. The
passphrase is case-sensitive and should not be longer than 16 alphanumeric characters. It must match
the passphrase of your other wireless network devices and is compatible with Linksys wireless products
only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.)
WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit
encryption, enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26
hexadecimal characters. Valid hexadecimal characters are "0" to "9" and "A" to "F".
Then click Connect and proceed to Step 3.
• WPA Personal (Wi-Fi Protected Access)
If your network has the wireless security WPA Personal enabled, this screen will appear.
Encryption - Select the type of algorithm you want to use, TKIP or AES, from the Encryption drop-down
menu.
Pre-shared Key - Enter a Pre-shared key of 8-63 characters in the Pre-shared Key field.
Then click Connect and proceed to Step 3.
Chapter 4: Setting up and Connecting the Wireless-N Notebook Adapter
Setting up the Adapter

Figure 4-5: WEP Key Needed for Connection

Figure 4-6: WPA Personal Needed for Connection

wep (wired equivalent privacy): a method of encrypting network
data transmitted on a wireless network for greater security.
encryption: encoding data transmitted in a network.
wpa (wi-fi protected access: a wireless security protocol
using TKIP (Temporal Key Integrity Protocol) encryption,
which can be used in conjunction with a RADIUS server.
8

Advertisement

Table of Contents
loading

Table of Contents