User Manual
Table Of Contents
- Intel(R) PRO/Wireless LAN Mini PCI Adapter User's Guide
- Contents: Intel(R) PRO/Wireless LAN Mini PCI Adapter User's Guide
- About Wireless LAN Technology
- What is a Site Survey?
- Software Installation
- Installation under Windows XP
- Installation under Windows 2000
- Installation under Windows NT 4.0
- Installation under Windows Me
- Installation under Windows 98SE
- Using Wireless Profiles in PROSet
- Connecting to a Network using PROSet
- Security Overview
- Setting Up WEP Encryption
- Connecting to a Network
- Troubleshooting
- Specifications
- Glossary
- Customer Support
- Network Software License Agreement
- Safety and Regulatory Notices
- Warranty
- Legal Information

● Virtual Private Networks
Authentication Types
The IEEE 802.1x standard provides a general authentication framework for 802 LANs and specifies an
extensible authentication protocol (EAP) to enable LAN transport for many different types of authentication
protocols.
Encryption Keys
To protect client traffic, the 802.11 standard defines Wireless Encryption Privacy (WEP) with fixed encryption
keys (and three optional key lengths). The use of fixed keys has made it easy to mount several types of attack
against WEP.
WEP Encryption
You can prevent unauthorized reception of your wireless data using the IEEE 802.11 Wired Equivalent Privacy
(WEP). The standard includes two levels of security, using a 64-bit key (sometimes referred to as 40-bit) or a
128-bit key. For better security, use a 128-bit key. If you use encryption, all wireless devices on your WLAN
must use the same encryption settings.
Refer to Setting up WEP Encryption for more information.
802.1x
A WAN client initiates an authorization request to the access point, which authenticates the client to an
Extensible Authentication Protocol (EAP) compliant RADIUS server. This RADIUS server may authenticate
either the user (via passwords) or the machine (by MAC address).
IPSEC
Software based IPSEC transport security.
TKIP (Temporal key Integrity Protocol)
Uses an encryption method called fast-packet rekeying, that changes the encryption keys frequency.
Virtual Private Networks (VPN)
The following VPN client software is supported by PROSet. Refer to Virtual Private Network (VPN) for more
information.
● Netstructure VPN (SST)
● Netstructure VPN (IPsec-IKE)
● Cisco 3000 VPN