Harmony security protocol – Harmony House 802.11a User Manual
Page 45

Harmony Utility
45
To create the text file, use a text program such as Microsoft Notepad or WordPad. The
text file should have a “.txt” extension. The first line of the text file must read
“[WEP_KEY_VALUE]”. Then, enter one to four Keys in the following format:
“key#=
# indicates the Key number (1-4) and
specified Key’s hexadecimal digits.
Each Key must be contain hexadecimal digits only (0-9 and A-F), and you must use the
same number of digits for each Key. The number of digits depends upon the Key Size
you select in the WEP Keys Configuration screen:
• For 64 Bit, use 10 digits per Key.
• For 128 Bit, use 26 digits per Key.
• For 152 Bit, use 32 digits per Key.
The following example illustrates the WEP Key file format for 64-bit encryption:
[WEP_KEY_VALUE]
key1=1234567890
key2=0987654321
key3=ABCDEF1234
key4=ABCDEFABCD
Harmony Security Protocol
Follow these steps to enable the Harmony Security Protocol:
Note:
The Harmony Security Protocol is not available on computers running
Windows 2000 Server or Windows NT.
1.
Select
Use Harmony Security Protocol within the Security Level box.
2.
Place a check mark in the
Log on to Harmony Security before Windows Logon box
if you want to connect to the wireless network before logging on to the Windows
operating system.
Note:
You should enable the
Log on to Harmony Security before Windows Logon
option if your computer connects to a Windows Domain Controller, connects
to a Novell network, automatically reconnects to shared network drives dur-
ing Windows logon, or runs networking software (e.g., PC Anywhere) before
connecting to the network.