Wireless Security Types - Lenovo 20074CU User Manual

User manual
Hide thumbs Also See for 20074CU:
Table of Contents

Advertisement

18. Next, select the connection type. Two types are available:
19. Select either Auto, 802.11b, 802.11g or 802.11a for Wireless Mode. This
20. Select one of the wireless security types, listed in the figure:
Figure 18. Wireless security types
Infrastructure
Use this connection type when your computer will be communicating
with wireless access points.
Adhoc
Use this connection type to communicate directly with another
computer without connecting to a wireless access point first.
setting is available only if the installed adapter is compatible with different
standards. If you select Auto, the adapter will automatically run in the mode
that is compatible with in-range access points. If you set the same mode as on
the in-range access point, the connection will be established faster.
None (encryption is disabled)
Select this option when connecting to non-secured (open) wireless
networks such as public hotspots. Optionally, you can establish a
wireless LAN connection before logging on to Windows. To do so,
select Use this profile to connect during Windows logon.
Use Static WEP Keys
A wireless network that implements this type of security uses
predefined alphanumeric or hexadecimal strings (keys) in encrypting
and decrypting data that is transmitted and received through the
wireless network. Usually, you enter these keys only once. They are
then automatically associated with your wireless adapter each time the
adapter is inserted or your computer is started. Optionally, if you want
to use this profile to establish a wireless LAN connection before
logging on to Windows, select Use this profile to connect during
Windows logon.
Use Wi-Fi Protected Access - Pre-Shared Key (WPA-PSK)
Wireless networks that implement this type of security require users to
authenticate with a Pre-Shared Key. Data transmitted and received
through the wireless network can be encrypted and decrypted by use
of WEP or TKIP data encryption. Optionally, if you want to establish a
wireless LAN connection before logging on to Windows, select Use
this profile to connect during Windows logon.
Use IEEEE 802.1x Authentication
Wireless networks that implement IEEE 802.1x Extensible
Authentication Protocol (EAP) security require each user to
authenticate his or her identity with a username and password or a
certificate credential before being allowed to connect. Data is
encrypted and decrypted by use of either static or dynamic WEP keys.
Dynamic keys are session-based and are generated each time an
authentication attempt is made.
Chapter 2. Using location profiles
17

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents