To modify an existing profile, select that profile from the My Wireless Networks box and click on modify. To create a new profile, click on New. 20 The Profile Settings box will appear allowing you to specify the settings for your new profile or change settings for your existing profile. Once you are finished entering the settings, click OK to save the changes. 21 4.4 Configuring Encryption This section describes the different types of encryption available and how to configure them. In most cases, encryption will be automatically configured and all that will need to be entered is the key, as described in Section 3 Step 2. The only time you will need to manually configure the encryption settings is if you are creating a custom profile. Click on Profile Settings then New. The profile settings box will appear. This is where you will change your encryption settings. As you can see you have five different options to choose from. 22 These three are meant for the home user: None: No encryption in use WEP: The most popular but least secure form of encryption WPA/WPA2-PSK: The most secure and recommended level of encryption The remaining two are for use in a corporate environment that utilizes authentication servers. If you do not know if you have an authentication server, you probably don’t and will want to stick with the three options above. 23 Configuring WEP encryption Select WEP from the Set Security Option box. Under Wired Equivalent Privacy (WEP), you will want to select Shared or Open, depending on the router settings. In the Key box, you will want to type in the encryption key for the router. If you check the Show text in the password field box, your key will appear in the box as you are typing it instead of showing only asterisks. This is helpful as it allows you to double check the key before saving the changes. Key Length will also be predetermined by the router. Refer to your routers settings to find out what you should select here. Key Index is the key on the router that is currently in use. Refer to your routers settings to find out what you should choose. Once you are done, click OK to save your settings. 24 Configuring WPA/WPA2-PSK Encryption (for home users) Select WPA/WPA2-PSK from the Set Security Option box. Under Passphrase Settings select either TKIP or AES depending on the settings for your router. Enter the encryption key into the KEY box. 25 Configuring WPA/WPA2 Encryption (for corporate networks) Select WPA/WPA2 from the Set Security Option box. Under Advanced Security Settings select either TKIP or AES depending on the settings for your router. Click on Advanced Config to enter your authentication settings. The adapter supports EAP-TLS, LEAP, EAP-TTLS, and PEAP authentication methods. Refer to your system administrator for information about what settings you should enter here. 26 Configuring 802.1x authentication (for corporate networks) Select 802.1x from the Set Security Option box. Click on Advanced Config to enter your authentication settings. 27 The adapter supports EAP-TLS, LEAP, EAP-TTLS, and PEAP authentication methods. Refer to your system administrator for information about what settings you should enter here. 4.5 Ad-hoc and Peer-to-Peer Wireless Networks Ad-hoc networking is used when you want to connect two or more computers together but you don’t have a router. In ad-hoc mode, you lose a lot of the features that come with a router. Instead of being able to operate at 150Mbps, the maximum connection speed is significantly less at 11Mbps. WEP encryption is the only security available in ad-hoc mode. To set up ad-hoc mode, you will need to create a new profile. 28 Open the Wireless Monitor. Click on Profile Setting, then click on New. The profile settings box will appear. First change the network type to Adhoc. (Infrastructure is for when you are using a router). Enter a profile name into the Profile Name box so that you can identify the profile. Type in a network name (SSID) into the SSID box Select your desired Channel You can also choose between no security or WEP security. If you choose WEP security, you can follow the instructions in the Configuring Encryption section of the manual. Click OK to save the profile. 29 Once that is done, click on the AP List. Select your new profile from the profile chooser and click Activate to enable the profile. You will need to configure all other computers that you are planning on connecting to your ad-hoc network with the same settings that you input on this screen. Every computer has to be set up exactly the same. If any of the settings are different, the network will not function. Troubleshooting: If you are having trouble connecting, if the connection is slow, or if it is unstable, you will want to try changing channels. Start with channel 1 and work your way up until you find a channel that gives you a stable connection. Each time you change the channel, save the settings, then reboot the computer. Also make sure that you do this on e...