User's Manual

Se
c
Se
c
W
E
A
u
Pa
s
W
E
W
E
Te
s
c
urity
c
urity S
y
E
P
u
thentica
t
s
sphrase
E
P Encr
y
E
P Keys
st
Wirel
e
y
stem
t
ion Ty
p
y
ption
e
ss
p
e
Select t
h
method
Di
ca
n
W
E
tr
a
W
P
tr
a
us
e
do
e
W
P
st
a
b
e
t
W
P
W
P
an
d
E
n
Normal
fails, se
Key."
C
method
Note: I
n
since
m
Select t
h
64
12
64
12
Enter a
and cli
c
WEP
K
four ke
y
strengt
h
be give
n
U
s
E
n
th
e
K
e
9)
• Click
C
Click t
h
h
e desir
e
:
sabled -
n
conne
E
P - Th
e
a
nsmissi
P
A/WP
A
a
nsmissi
ed
if
p
os
es NOT
P
A Pers
o
a
ndard.
T
t
te
r
secu
r
P
A-PS
K
P
A2 Per
d
offers
e
n
cryptio
n
ly this c
a
lec
t
the
a
C
hec
k
yo
u
to use.
n
Infrast
r
m
os
t
Acc
e
h
e WEP
Bi
t
Ke
y
8 Bit K
e
Bit Ke
y
8 Bit K
e
word or
ck
the "
G
K
ey(s). If
y
fields
h
is set t
o
n
a key
v
s
e the ra
d
n
te
r
the
k
e
same k
e
e
ys must
and the
l
C
lea
r
K
e
h
is butto
n
e
d optio
n
No secu
r
c
t to you
r
e
802.11
b
o
n, but t
A
2 Pers
o
o
n. WP
A
sible. W
require
a
o
nal - D
a
T
his is a
l
r
ity tha
n
K
, you sh
o
sonal -
T
e
ven gr
e
n
Standa
r
a
n be le
ft
a
ppropri
a
u
r
wirel
e
r
ucture
m
e
ss Poin
t
Encryp
t
y
s(10H
e
ys (26
H
y
s (5 AS
C
e
ys (13
A
group o
f
G
enerate
K
encrypt
i
w
ill be
po
o
128-
b
it
v
alue.
d
io butto
n
k
ey valu
e
e
y value
be ente
l
etters A
e
ys to se
t
n
to test
t
n
, and th
e
r
ity is u
s
r
networ
k
b
standa
r
h
e encry
p
o
nal - Li
k
A
is mor
e
W
PA Pers
o
a
Radius
a
ta is en
c
l
ate
r
sta
n
n
WEP. I
f
o
ul
d
use
T
his is a
f
e
ate
r
sec
u
r
d) meth
o
ft
at the
d
a
te valu
e
e
ss card'
s
m
ode, eit
h
t
s can us
e
t
ion leve
l
e
x chars)
H
ex char
s
C
II char
s
A
SCII ch
f
printab
K
ey"
b
u
t
i
on stren
g
o
pulate
d
, then o
n
n
s to sel
e
e
you wi
s
s.
r
e
d
in H
e
A
~ F.
t
the Ke
y
t
he wire
l
e
n enter
t
s
ed. Any
k
. This i
s
r
d. Data
p
tion sy
s
k
e WEP,
e
secure
t
o
nal is t
h
Server
o
c
rypted
u
n
dar
d
th
a
f
all you
r
WPA-P
f
urthe
r
d
u
rity, usi
o
d of en
c
d
efault v
a
e
- "Ope
n
s
docum
e
h
e
r
setti
n
e
both
m
l
:
s
)
s
)
ars)
le chara
c
t
ton to a
u
gth is se
t
d
with ke
y
n
ly the s
e
e
c
t
the
d
s
h to use
e
x. Hex
c
y
s to be
b
l
ess con
n
t
he setti
n
one usi
n
s
defaul
t
is encry
p
s
te
m
is n
o
data is
e
t
han WE
h
e versi
o
o
n your
L
u
sing th
e
a
n WEP,
r
Wirele
s
S
K
rath
e
d
evelop
m
ng the
A
c
ryption
.
a
lue of "
A
n
Syste
m
e
ntation
n
g will
n
m
ethods.
c
ters in t
h
u
tomati
c
t
to 64-
b
y
values
e
lected
W
d
efault k
e
. Other
s
c
haracte
r
b
lank.
n
ection.
n
gs for t
h
n
g the co
r
.
p
ted
b
ef
o
ot
very
s
e
ncrypte
d
P, and s
h
o
n of W
P
L
AN.
e
WPA-
P
and
p
ro
v
s
s statio
n
er
than
W
m
en
t
of
W
A
ES (Ad
v
.
A
utoma
t
m
" or "S
h
to see
w
n
ormally
h
e Pass
p
c
ally con
it, then
e
. If encr
y
W
EP key
e
y.
s
tations
m
r
s are th
e
h
e select
r
rec
t
SS
I
o
re
s
trong.
d
before
h
oul
d
be
P
A whic
h
P
S
K
v
ides m
u
n
s suppo
W
EP.
W
PA-PS
K
v
ance
d
t
ic." If t
h
h
are
d
w
ha
t
work,
p
hrase
bo
figure t
h
e
ach of t
h
y
ption
field wi
m
us
t
ha
v
e
digits (
0
e
d
I
D
h
u
ch
r
t
K
,
h
a
t
o
x
h
e
h
e
ll
v
e
0
~
33