Figure 6-4: Profile Editor - Cisco Linksys Wireless-G WPC54GX User Manual

Notebook adapter with srx
Table of Contents

Advertisement

Wireless-G Notebook Adapter with SRX
• The Re-Scan button is disabled while scanning takes place. When the scan is complete, the Site Survey
list displays all the discovered networks.
Working with Profiles
Profiles store configuration information about how your Adapter connects to specific wireless networks. Use the
Profile Editor to create new profiles or modify existing ones.
Profile Editor
SSID. Service Set Identifier (SSID) is a name that uniquely identifies a wireless local area network. Each device in
the wireless network must have the same SSID configured in order to participate in the network.
BSSID. Basic Service Set (BSS) is the collection of wireless devices operating with an individual access point in
infrastructure mode or without an access point in ad-hoc mode.
Network Type. The Network Type indicates the type of network arrangement.
• Infrastructure. Refers to an existing wireless network, usually with an interface to a wired network, for
Internet and email access, file sharing, and print and other services.
• Ad Hoc. Refers to a temporary wireless network that has been set up by another user.
• Start Ad-Hoc Network. Permits you to set up a new ad-hoc network to communicate with other PCs
without using an access point.
Channel. In infrastructure networks, the channel used for radio communications is determined at the access
point and for ad-hoc networks, the channel is determined by the user who starts the network. It is necessary to
select a channel only if you are starting a new ad-hoc network.
Authentication. The authentication and encryption settings provide options for configuring a secure connection
between your PC and access point. The following authentication options are available:
• Open. No authentication.
• Share. Authentication based on shared keys.
Encryption Type. The following encryption options are available:
• None. No encryption.
• WEP. Encryption based on shared WEP keys.
Chapter 6: Using the Wireless Network Utility
Using the Utility

Figure 6-4: Profile Editor

18

Advertisement

Table of Contents
loading

Table of Contents