User's Manual

o Maximum of four adapters is supported.
Switching Between 2.4 and 5 GHz Bands
Intel(R) PROSet supports switching between 802.11a (5 GHz) and 802.11b (2.4 GHz) bands.
Using the Advanced Settings options, you can define band priorities.
Changing the Settings for Adapter Switching
If you have two adapters installed, you can define the adapter to be used first. Adapter priorities
can be set in the Adapter Switching dialog.
To change the adapter switching settings:
1. From the General page, select the wireless adapter on the left side pane.
2. Click the Adapter Switching icon on the left side pane.
3. Click the Adapter Switching checkbox under the Settings heading.
4. Prioritize adapters in the lower adapter display list.
Select an adapter in the Adapter Type list and use the up/down arrows on the left side
of the dialog to arrange the adapters in priority. The adapter in the highest position is
used first.
5. Click the adapter name that you want to use in the upper display list. The current
adapter link status displays next to the adapter name.
NOTE: One wireless adapter can be used for each band operating at a time.
6. After you have switched to the desired adapter, click OK to close the Adapter Switching
dialog and return to the General tab.
5.Security Overview
Wireless Security
Since wireless networking devices transmit information through radio waves, it is imperative that
you protect your information by configuring your security settings. There are three main
components that, when used together, can protect your wireless network:
Service Set Identifier (SSID) — The name of a device on a network, the SSID is the first
level of security, but it is not fool-proof because the access points broadcast the SSIDs
across a wireless network. This level of security is okay if you are on a peer-to-peer
network without any access points, but for larger networks, more complex security
measures should be put in place.
Wired Equivalent Privacy (WEP) — Supported by the IEEE 802.11 standard, WEP uses
64- or 128-bit encryption keys to encrypt data as it is sent or received by each client on
a wireless network. The way these keys are authenticated determines the level of
security on your wireless network. Using the default keys, however, makes your
wireless network vulnerable and you should not use them.