Back to Contents

Personal Security


Use Personal Security if you are a home or small business user who can use a variety of simple security procedures to protect your WiFi connection. You may want to select from the list of security settings that are easy to configure, for your WiFi network. See Personal Security Settings for a description of each of the options. A RADIUS or AAA server is not required.


Personal Security Settings

Personal Security Settings Description

Name Setting

General Settings

Select to open the Personal Security Settings. The security settings that are available are dependent on the Operating Mode selected in the Create WiFi Profile Security Settings.

Device to Device (ad hoc): In device to device mode, also called ad hoc mode, wireless computers send information directly to other wireless computers. You can use ad hoc mode to connect multiple computers in a home or small office, or to set up a temporary wireless network for a meeting.

NOTE: Device to Device (ad hoc) networks are identified with a notebook image (notebook) in the WiFi Networks and Profiles list.

Network (Infrastructure): An infrastructure network consists of one or more access points and one or more computers with WiFi adapters installed. At least one access point should also have a wired connection. For home users, this is usually a broadband or cable network.

NOTE: Infrastructure networks are identified with an access point image (access point) in the WiFi Networks and Profiles list.

Security Settings

If you are configuring a Device to Device (ad hoc) profile, select one of the following data encryption settings:

If you are configuring a Network (Infrastructure) profile, select:

Advanced button

Click to access the Advanced Settings and configure the following options:

Back

View the prior page in the Profile Wizard.

OK

Closes the Profile Wizard and saves the profile.

Cancel

Closes the Profile Wizard and cancels any changes made.

Help?

Provides the help information for the current page.


Set up Data Encryption and Authentication

In a home WiFi network you can use a variety of simple security procedures to protect your wireless connection. These include:

Wi-Fi Protected Access (WPA) encryption provides protection for your data on the network. WPA uses an encryption key called a Pre-Shared Key (PSK) to encrypt data before transmission. Enter the same password in all of the computers and access point in your home or small business network. Only devices that use the same encryption key can access the network or decrypt the encrypted data transmitted by other computers. The password automatically initiates the Temporal Key Integrity Protocol (TKIP) or AES-CCMP protocol for the data encryption process.

Network Keys

WEP encryption provides two levels of security:

For improved security, use a 128-bit key. If you use encryption, all wireless devices on your wireless network must use the same encryption keys.

You can create the key yourself and specify the key length (64-bit or 128-bit) and key index (the location that a specific key is stored). The greater the key length, the more secure the key. When the length of a key is increased by one character, the number of possible keys doubles.

Key Length: 64-bit

Pass phrase (64-bit): Enter five (5) alphanumeric characters, 0-9, a-z or A-Z.
Hex key (64-bit): Enter 10 hexadecimal characters, 0-9, A-F.

Key Length: 128-bit

Pass phrase (128-bit): Enter 13 alphanumeric characters, 0-9, a-z or A-Z.
Hex key (128-bit): Enter 26 hexadecimal characters, 0-9, A-F.

With WEP data encryption, wireless station can be configured with up to four keys (the key index values are 1, 2, 3, and 4). When an access point or a wireless station transmits an encrypted message that uses a key stored in a specific key index, the transmitted message indicates the key index that was used to encrypt the message body. The receiving access point or wireless station can then retrieve the key that is stored at the key index and use it to decode the encrypted message body.


Set up a Client with Open Authentication and No Data Encryption (None)

CAUTION: WiFi networks using no authentication or encryption are highly vulnerable to access by unauthorized users.

On the Intel(R) PROSet/Wireless WiFi main window, use one of the following methods to connect to a device to device network:

To create a profile for a WiFi network connection with no encryption perform these steps:

  1. Click Profiles on the WiFi connection utility main window.
  2. On the Profiles list, click Add to open the Create WiFi Profile General Settings.
  3. Profile Name: Enter a descriptive profile name.
  4. WiFi Network Name (SSID): Enter the name of your wireless network.
  5. Operating Mode: Click Device to Device (ad hoc).
  6. Click Next to open the Security Settings. Personal Security is selected by default.
  7. Security Settings: The default setting is None, which indicates that there is no security on this wireless network.
  8. Click OK. The profile is added to the Profiles list and connects to the wireless network.

Set up a Client with WEP 64-bit or WEP 128-bit Data Encryption

When WEP data encryption is enabled, a network key or password is used for encryption.

A network key is provided for you automatically (for example, it might be provided by your wireless network adapter manufacturer), or you can enter it yourself and specify the key length (64-bit or 128-bit), key format (ASCII characters or hexadecimal digits), and key index (the location where a specific key is stored). The greater the key length, the more secure the key.

To add a network key for an infrastructure network connection:

  1. On the WiFi connection utility main window, double-click an infrastructure network in the WiFi Networks list or select the network and click Connect.
  2. Click Profiles to access the Profiles list.
  3. Click Properties to open the Create WiFi Profile General Settings. The Profile name and WiFi Network Name (SSID) display. Network (Infrastructure) should be selected as the Operating Mode.
  4. Click Next to open the Security Settings. Personal Security is selected by default.
  5. Security Settings: The default data encryption setting is None, which indicates that there is no security on this wireless network.

To add a password or network key:

  1. Security Settings: Select either WEP 64-bit or WEP 128-bit to configure WEP data encryption with a 64-bit or 128-bit key.

When WEP encryption is enabled on an access point, the WEP key is used to verify access to the network. If the wireless device does not have the correct WEP key, even though authentication is successful, the device is unable to transmit data through the access point or decrypt data received from the access point.

Name Description

Password

Enter the Wireless Security Password (Pass phrase) or Encryption Key (WEP key).

Pass phrase (64-bit )

Enter five (5) alphanumeric characters, 0-9, a-z or A-Z.

WEP key (64-bit)

Enter 10 hexadecimal characters, 0-9, A-F.

Pass phrase (128-bit)

Enter 13 alphanumeric characters, 0-9, a-z or A-Z.

WEP key (128-bit)

Enter 26 hexadecimal characters, 0-9, A-F.

  1. Key Index: Change the Key Index to set up to four passwords.
  2. Click OK to return to the Profiles list.

To add more than one password:

  1. Select the Key Index number: 1, 2, 3, or 4.
  2. Enter the Wireless Security Password.
  3. Select another Key Index number.
  4. Enter another Wireless Security Password.
  5. Click OK to return to the Profiles list.

Set up a Client with WPA*-Personal (TKIP) or WPA2*-Personal (TKIP) Security Settings

WPA* Personal Mode requires manual configuration of a pre-shared key (PSK) on the access point and clients. This PSK authenticates a user's password or identifying code, on both the client station and the access point. The access point performs the authentication. WPA Personal Mode is targeted to home and small business environments.

WPA2* is the second generation of WPA security that provides enterprise and consumer wireless users with a high level of assurance that only authorized users can access their wireless networks. WPA2 provides a stronger encryption mechanism through Advanced Encryption Standard (AES), which is a requirement for some corporate and government users.

NOTE: To achieve transfer rates greater than 54 Mbps on 802.11n connections, WPA2-AES security must be selected. No security (None) can be selected to enable network setup and troubleshooting.

To configure a WiFi network profile with WPA-Personal network authentication and TKIP data encryption:

  1. On the WiFi connection utility main window, double-click an infrastructure network in the WiFi Networks list or select the network and click Connect.
  2. Click Profiles to access the Profiles list.
  3. Click Properties to open the WiFi Profile Properties General Settings. The Profile name and WiFi Network Name (SSID) display. Network (Infrastructure) should be selected as the Operating Mode.
  4. Click Next to open the Security Settings.
  5. Select Personal Security.
  6. Security Settings: Select WPA-Personal (TKIP) to provide security to a small business network or home environment. A password, called a pre-shared key (PSK), is used. The longer the password, the stronger the security of the wireless network.

    If your wireless access point or router supports WPA2-Personal, then you should enable it on the access point and provide a long, strong password. The longer the password, the stronger the security of the wireless network. The same password entered in the access point needs to be used on this computer and all other wireless devices that access the wireless network.
  7. NOTE: WPA-Personal and WPA2-Personal are interoperable.


  8. Wireless Security Password (Encryption Key): Enter a text phrase with eight to 63 characters. Verify that the network key matches the password in the wireless access point.
  9. Click OK to return to the Profiles list.

Set up a Client with WPA*-Personal (AES-CCMP) or WPA2*-Personal (AES-CCMP) Security Settings

Wi-Fi Protected Access (WPA*) is a security enhancement that strongly increases the level of data protection and access control to a wireless network. WPA enforces 802.1X authentication and key-exchange and only works with dynamic encryption keys. For a home user or small business, WPA-Personal uses either Advanced Encryption Standard - Counter CBC-MAC Protocol (AES-CCMP) or Temporal Key Integrity Protocol (TKIP).

NOTE: To achieve transfer rates greater than 54 Mbps on 802.11n connections, WPA2-AES security must be selected. No security (None) can be selected to enable network setup and troubleshooting.

To create a WiFi network profile with WPA2*-Personal network authentication and AES-CCMP data encryption:

  1. On the WiFi connection utility main window, double-click an infrastructure network from the WiFi Networks list or select the network and click Connect.
  2. If these are being transmitted, the Profile name and WiFi Network Name (SSID) should display on the General Settings screen. Network (Infrastructure) should be selected as the Operating Mode. Click Next to open the Security Settings.
  3. Select Personal Security.
  4. Security Settings: Select WPA2-Personal (AES-CCMP) to provide this level of security in the small network or home environment. It uses a password, also called a pre-shared key (PSK). The longer the password, the stronger the security of the wireless network.

AES-CCMP (Advanced Encryption Standard - Counter CBC-MAC Protocol) is a newer method for privacy protection of wireless transmissions specified in the IEEE 802.11i standard. AES-CCMP provides a stronger encryption method than TKIP. Choose AES-CCMP as the data encryption method whenever strong data protection is important.

If your Wireless access point or router supports WPA2-Personal, then you should enable it on the access point and provide a long, strong password. The same password entered into the access point needs to be used on this computer and all other wireless devices that access the wireless network.

NOTE: WPA-Personal and WPA2-Personal are interoperable.

  1. Password: Wireless Security Password (Encryption Key): Enter a text phrase (length is between eight and 63 characters). Verify that the network key used matches the wireless access point key.
  2. Click OK to return to the Profiles list.

Back to Top

Back to Contents

Trademarks and Disclaimers