Use Personal Security if you are a home or small business user who can use a variety of simple security procedures to protect your WiFi connection. You may want to select from the list of security settings that are easy to configure, for your WiFi network. See Personal Security Settings for a description of each of the options. A RADIUS or AAA server is not required.
Name | Setting |
---|---|
General Settings |
Select to open the Personal Security Settings. The security settings that are available are dependent on the Operating Mode selected in the Create WiFi Profile Security Settings. Device to Device (ad hoc): In device to device mode, also called ad hoc mode, wireless computers send information directly to other wireless computers. You can use ad hoc mode to connect multiple computers in a home or small office, or to set up a temporary wireless network for a meeting.
Network (Infrastructure): An infrastructure network consists of one or more access points and one or more computers with WiFi adapters installed. At least one access point should also have a wired connection. For home users, this is usually a broadband or cable network.
|
Security Settings |
If you are configuring a Device to Device (ad hoc) profile, select one of the following data encryption settings:
If you are configuring a Network (Infrastructure) profile, select:
|
Advanced button |
Click to access the Advanced Settings and configure the following options:
|
Back |
View the prior page in the Profile Wizard. |
OK |
Closes the Profile Wizard and saves the profile. |
Cancel |
Closes the Profile Wizard and cancels any changes made. |
Help? |
Provides the help information for the current page. |
In a home WiFi network you can use a variety of simple security procedures to protect your wireless connection. These include:
Wi-Fi Protected Access (WPA) encryption provides protection for your data on the network. WPA uses an encryption key called a Pre-Shared Key (PSK) to encrypt data before transmission. Enter the same password in all of the computers and access point in your home or small business network. Only devices that use the same encryption key can access the network or decrypt the encrypted data transmitted by other computers. The password automatically initiates the Temporal Key Integrity Protocol (TKIP) or AES-CCMP protocol for the data encryption process.
WEP encryption provides two levels of security:
For improved security, use a 128-bit key. If you use encryption, all wireless devices on your wireless network must use the same encryption keys.
You can create the key yourself and specify the key length (64-bit or 128-bit) and key index (the location that a specific key is stored). The greater the key length, the more secure the key. When the length of a key is increased by one character, the number of possible keys doubles.
Pass phrase (64-bit): Enter five (5) alphanumeric characters, 0-9, a-z or A-Z.
Hex key (64-bit): Enter 10 hexadecimal characters, 0-9, A-F.
Pass phrase (128-bit): Enter 13 alphanumeric characters, 0-9, a-z or A-Z.
Hex key (128-bit): Enter 26 hexadecimal characters, 0-9, A-F.
With WEP data encryption, wireless station can be configured with up to four keys (the key index values are 1, 2, 3, and 4). When an access point or a wireless station transmits an encrypted message that uses a key stored in a specific key index, the transmitted message indicates the key index that was used to encrypt the message body. The receiving access point or wireless station can then retrieve the key that is stored at the key index and use it to decode the encrypted message body.
CAUTION: WiFi networks using no authentication or encryption are highly vulnerable to access by unauthorized users.
On the Intel® PROSet/Wireless WiFi Connection Utility main window, use one of the following methods to connect to a device to device network:
To create a profile for a WiFi network connection with no encryption perform these steps:
When WEP data encryption is enabled, a network key or password is used for encryption.
A network key is provided for you automatically (for example, it might be provided by your wireless network adapter manufacturer), or you can enter it yourself and specify the key length (64-bit or 128-bit), key format (ASCII characters or hexadecimal digits), and key index (the location where a specific key is stored). The greater the key length, the more secure the key.
To add a network key for an infrastructure network connection:
To add a password or network key:
When WEP encryption is enabled on an access point, the WEP key is used to verify access to the network. If the wireless device does not have the correct WEP key, even though authentication is successful, the device is unable to transmit data through the access point or decrypt data received from the access point.
Name Description Password
Enter the Wireless Security Password (Pass phrase) or Encryption Key (WEP key).
Pass phrase (64-bit )
Enter five (5) alphanumeric characters, 0-9, a-z or A-Z.
WEP key (64-bit)
Enter 10 hexadecimal characters, 0-9, A-F.
Pass phrase (128-bit)
Enter 13 alphanumeric characters, 0-9, a-z or A-Z.
WEP key (128-bit)
Enter 26 hexadecimal characters, 0-9, A-F.
To add more than one password:
WPA* Personal Mode requires manual configuration of a pre-shared key (PSK) on the access point and clients. This PSK authenticates a user's password or identifying code, on both the client station and the access point. The access point performs the authentication. WPA Personal Mode is targeted to home and small business environments.
WPA2* is the second generation of WPA security that provides enterprise and consumer wireless users with a high level of assurance that only authorized users can access their wireless networks. WPA2 provides a stronger encryption mechanism through Advanced Encryption Standard (AES), which is a requirement for some corporate and government users.
NOTE: To achieve transfer rates greater than 54 Mbps on 802.11n connections, WPA2-AES security must be selected. No security (None) can be selected to enable network setup and troubleshooting.
To configure a WiFi network profile with WPA-Personal network authentication and TKIP data encryption:
NOTE: WPA-Personal and WPA2-Personal are interoperable.
Wi-Fi Protected Access (WPA*) is a security enhancement that strongly increases the level of data protection and access control to a wireless network. WPA enforces 802.1X authentication and key-exchange and only works with dynamic encryption keys. For a home user or small business, WPA-Personal uses either Advanced Encryption Standard - Counter CBC-MAC Protocol (AES-CCMP) or Temporal Key Integrity Protocol (TKIP).
NOTE: To achieve transfer rates greater than 54 Mbps on 802.11n connections, WPA2-AES security must be selected. No security (None) can be selected to enable network setup and troubleshooting.
To create a WiFi network profile with WPA2*-Personal network authentication and AES-CCMP data encryption:
AES-CCMP (Advanced Encryption Standard - Counter CBC-MAC Protocol) is a newer method for privacy protection of wireless transmissions specified in the IEEE 802.11i standard. AES-CCMP provides a stronger encryption method than TKIP. Choose AES-CCMP as the data encryption method whenever strong data protection is important.
If your Wireless access point or router supports WPA2-Personal, then you should enable it on the access point and provide a long, strong password. The same password entered into the access point needs to be used on this computer and all other wireless devices that access the wireless network.
NOTE: WPA-Personal and WPA2-Personal are interoperable.