Set up profile security, Set up security, The wireless network uses – Intel 3945ABG User Manual
Page 48: Security, Security settings, Refer to, For more information, Encryption, Use intel(r) proset/wireless software, Back to contents
Set Up Profile Security: Intel(R) PRO/Wireless 3945ABG
Network Connection User Guide
Use Intel(R) PROSet/Wireless Software
Personal Security
Personal Security Settings
Set up Data Encryption and Authentication
●
Configure Profiles for Device to Device (Ad Hoc) Networks
❍
Set up a Client with Open Authentication and No Data Encryption (None)
❍
Set up a Client with WEP 64-bit or WEP 128-bit Data Encryption
●
Configure Profiles for Infrastructure Networks
❍
Set up a Client with No Data Encryption and No Network Authentication (None)
❍
Set up a Client with WEP 64-bit or WEP 128-bit Data Encryption
❍
Set up a Client with WPA-Personal (TKIP) or WPA2-Personal (TKIP) Security Settings
❍
Set up a Client with WPA-Personal (AES-CCMP) or WPA2-Personal (AES-CCMP) Security Settings
●
Configure Profiles for Device to Device (Ad Hoc) Networks
❍
Set up a Client with Open Network Authentication and No Data Encryption (None)
❍
Set up a Client with Open Network Authentication and WEP Data Encryption
●
Configure Profiles for Infrastructure Networks
❍
Network Authentication
■
Set up a Client with Shared Network Authentication
■
Set up a Client with WPA-Personal or WPA2 Personal Network Authentication
■
Set up a Client with WPA-Enterprise or WPA2-Enterprise Network Authentication
❍
802.1x Authentication Types
■
Set up a Client with MD5 Network Authentication
■
Set up a Client with WEP Data Encryption and EAP-SIM Network Authentication
■
Set up a Client with TLS Network Authentication
■
Set up a Client with TTLS Network Authentication
■
Set up a Client with PEAP Network Authentication
■
Set up a Client with LEAP Network Authentication
■
Set up a Client with EAP-FAST Network Authentication
Use Intel(R) PROSet/Wireless Software
The following sections describe how to use Intel(R) PROSet/Wireless to set up the required security settings for
your wireless adapter. Refer to
.
It also provides information about how to configure advanced security settings for your wireless adapter. This
requires information from a systems administrator (corporate environment) or advanced security settings on