User Manual

Appendix C: Configuring Security Settings On Wireless Clients
Configuring Static WEP Security On A Client
C-10
Psion Teklogix 9160 Wireless Gateway User Manual
Click OK on the Wireless Network Properties dialog to close it and save your changes.
Connecting To The Wireless Network With A Static WEP Client
Static WEP clients should now be able to associate and authenticate with the access
point. As a client, you will not be prompted for a WEP key. The WEP key config-
ured on the client security settings is automatically used when you connect.
Network Authentication
Open
or
Shared
, depending on how you configured this option on the access point.
Note: When the Authentication Algorithm on the access point is set to Both,
clients set to either Shared or Open can associate with the AP. Clients con-
figured to use WEP in Shared mode must have a valid WEP key in order to
associate with the AP. Clients configured to use WEP as an Open system
can associate with the AP even without a valid WEP key (but a valid key will
be required to actually view and exchange data). For more information, see
Online Help on the access point.
Data Encryption
WEP
Network Key
Provide the
WEP key
you entered on the access point Security settings in the Transfer Key
Index position.
For example, if the Transfer Key Index on the access point is set to
1
, then for the client Net-
work Key specify the WEP Key you entered as
WEP Key 1
on the access point.
Key Index
Set key index to indicate which of the WEP keys specified on the access point Security page
will be used to transfer data from the client back to the access point.
For example, you can set this to
1, 2, 3,
or
4
if you have all four WEP keys configured on the
access point.
The key is provided for
me automatically
Disable
this option (click to uncheck the box).
Table C.2 Association Settings
Enable IEEE 802.1x authentica-
tion for this network
Make sure that IEEE 802.1x authentication is
disabled
(box should be unchecked).
(Setting the encryption mode to WEP should automatically disable authentication.)
Table C.3 Authentication Settings