Red Hat ENTERPRISE LINUX 5 - DEPLOYMENT Deployment Manual page 210

Hide thumbs Also See for ENTERPRISE LINUX 5 - DEPLOYMENT:
Table of Contents

Advertisement

Chapter 15. Network Configuration
2. Click the New button on the toolbar.
3. Select Wireless connection from the Device Type list and click Forward.
4. If you have already added the wireless network interface card to the hardware list, select it from
the Wireless card list. Otherwise, select Other Wireless Card to add the hardware device.
Note
The installation program usually detects supported wireless Ethernet devices and
prompts you to configure them. If you configured them during the installation, they are
displayed in the hardware list on the Hardware tab.
5. If you selected Other Wireless Card, the Select Ethernet Adapter window appears. Select the
manufacturer and model of the Ethernet card and the device. If this is the first Ethernet card for
the system, select eth0; if this is the second Ethernet card for the system, select eth1 (and so
on). The Network Administration Tool also allows the user to configure the resources for the
wireless network interface card. Click Forward to continue.
6. On the Configure Wireless Connection page as shown in
configure the settings for the wireless device.
Note: Open System and Shared Key Authentication
For the Authentication dropdown, note that wireless access points using WEP
encryption have a choice between using open system and shared key authentication.
Shared key authentication requires an exchange between the client and the access
point during the association process that proves that the client has the correct
WEP key. Open system authentication allows all wireless clients to connect.
Counterintuitively, shared key auuthentication is less secure than open system, and
thus is less widely deployed. It is therefore recommended to select Open System
(open) as the authentication method when you do not know which method the access
point requires. If connecting to the access point using open system fails, then try
switching to shared key authentication.
184
Figure 15.16, "Wireless
Settings",

Advertisement

Table of Contents
loading

Table of Contents