26
Actiontec 54 Mbps Wireless PC Card User Manual
How do I make a HEX-based WEP key?
64-bit WEP - Composed of 10 alphanumeric characters (0-9, A-F).
Example: 843A29A562
128-bit WEP - Composed of 26 alphanumeric characters (0-9, A-F).
Example: 3C29F2536BEF3276D32E364A2C
256-bit WEP - Composed of 58 alphanumeric characters (0-9, A-F).
Example: 3C29565489452869256FB585976135675236DD4A55E9C6546374851613
After installing the PC Card I can’t use XP’s Wireless Zero Configuration to
connect to any access points. What should I do?
The PC Card uses its own utility (which includes a site survey) for configuration,
and turns off the Wireless Zero Configuration utility. To use XP’s utility instead
of Actiontec’s, activate “External Configuration” in the Main tab of the Wireless
Configuration Utility (see page 13).
How do I enable WEP in XP using the Wireless Zero Configuration Utility?
First, make sure the PC Card is correctly installed in the computer. Then, in
the system tray (in the lower right hand side of the desktop, next to the clock),
right-click on the approprate connection icon and select View Available
Wireless Networks. When the “Connect to Wireless Network” window appears,
click Advanced. The “Wireless Network Connection Properties” window
appears. Select a wireless network, then click Configure. When the “Wireless
Network Properties” window appears, make sure the correct SSID or network
name is entered in the “Network Name (SSID)” text box. Then, activate “Data
Encryption” by clicking in the appropriate check box. If the text boxes below
remain grayed out, make sure the check box next to “The key is provided for me
automatically” is unchecked (not active). Select a “Key format” and “Key length”
from the appropriate list boxes, then enter the WEP key in the “Network key”
text box. If connecting to an ad hoc network, click in the “This is a computer-to-
computer” (ad hoc) network…” check box to activate. Click OK.
What is the difference between 40-bit and 64-bit encryption?
There really is no difference between the two. They are different terminologies
used throughout the industry for the same level of encryption.
Comments to this Manuals