Trust Computer Products IBM 802.11a/b/g Wireless CardBus Adapter Manuale d'uso

Pagina 23

Advertising
background image

window. Type the encryption information and click OK.

v

Key Entry Method

: Enables you to select the entry method for an encryption

key, using hexadecimal (0-9, A-F) or ASCII text (all keyboard characters.

v

Encryption Keys

: Enables you to specify either a per-user or up to four

shared keys as the default encryption key to be used.

v

Shared Keys (1-4)

: Defines a set of shared encryption keys for network

configuration security. To enable security using a shared key, type at least
one shared key value. After typing a value, click the radio button next to the
appropriate shared key to select it as the default encryption key.

v

Key Length

: Defines the length for each encryption key. Options include:

– 64 bit (type 10 digits)
– 128 bit (type 26 digits)
– 152 bit (enter 32 digits)

v

LEAP

: Enables you to use LEAP for dynamic security keys.

v

Externally Managed 802.1x Keys

: Configures the station to use externally

provided 802.1x authentication.

v

Disabled

: Selects no security.

5.

Click the Advanced tab and the following screen appears.

Specify the following parameters:

Installation guide

15

Advertising