54
L i f e B o o k N S e r i e s N o t e b o o k - S e c t i o n F i v e
Refer to the access point manual, or contact your
network administrator
9.
Configure Wireless Network Key parameters (Net-
work Authentication and Encryption).
a. Choose the Network Authentication method
appropriate for your wireless LAN. Options
include Open, Shared, WPA, and WPA-PSK.
Ad Hoc Networks
: Network Authentication
settings must be identical for all computers in
the Ad Hoc network.
Access Point (Infrastructure Networks):
Network Authentication setting must be config-
ured to match the setting of the Access Point(s).
Please contact your network administrator for
this information.
b. Choose the Encryption method appropriate for
your wireless LAN. Options for Open or Shared
Authentication are None or WEP. Options for
WPA or WPA-PSK are WEP or TKIP.
c. If using static WEP keys, clear the check mark
from the [The key is provided for me automati-
cally] check box. If using an authentication
method that uses dynamic WEP (e.g., WPA,
WPA-PSK, 802.1x/EAP), the check box should
remain checked. Please contact your network
administrator for the correct settings.
d. Static WEP keys (if applicable) are entered in the
[Network Key] box. Configuration of the
[Network Key] is not required if the [The key is
provided for me automatically] check box is
checked.
■
Static WEP keys entered in ASCII code
format will be either five characters (40-bit)
or thirteen characters (104-bit) in length.
Valid characters are 0 - 9, A - Z.
■
Static WEP keys entered in hexadecimal
code format will be either ten characters
(40-bit) or twenty-six characters (104-bit)
in length. Valid characters are 0 - 9, A - F.
Ad Hoc Networks:
Assign the same net-work
key to all the personal computers to be
connected.
Access Point (Infrastructure) Networks:
Assign the identical network key that is
programmed into the access point. Please
contact your network administrator for this
information.
e. If using static WEP keys, confirm the Network
key by re-entering the same data in the [Confirm
network key:] field.
f. The Key index used must be identical to the
transmit key used in the Access Point or other
wireless device. This is only applicable when
static WEP keys are used. Please contact your
network administrator for this information.
10.
Access Point (Infrastructure) Networks Only
: If
the wireless network you are establishing connec-
tivity to implements an access control security
mechanism, configuration of 802.1x parameters
may be necessary. Please contact your network
administrator for these settings. Configuration of
these parameters is not applicable to home users.
11. Click [OK] to close the [Wireless Network] window
which will cause the WLAN device to re-establish
wireless network connectivity using the recently
configured parameters.
CONFIGURATION USING
INTEL PROSET SOFTWARE
This section explains the procedure to properly
configure the WLAN device using the Intel PROSet Soft-
ware. Pre-defined parameters will be required for this
procedure. Please consult with your network adminis-
trator for these parameters:
Network Name
- Also known as the SSID
Network Key (WEP)
- Required if using static WEP
keys.
Authentication Typ
e - Open, Shared, WPA, or WPA-
PSK
Procedure
1.
Activate the WLAN device using either the Wireless
On/Off Switch or the Intel PROSet software.
2.
Click the [Start] button first and then [Control
Panel].
3.
If the Control Panel is in Category view, switch to
Classic view by clicking "Switch to Classic View"
which can be found in the left frame of the Control
Panel window.
4.
Double-click the icon [Intel PROSet] to execute the
Intel PROSet Software.
5.
From the General page, click the Networks tab.
6.
Click the [Add] button. The General Settings dialog
displays.
7.
From the General page, click the Networks tab.
8.
Click the [Add] button. The General Settings dialog
displays.
9.
Enter a profile name in the Profile Name field.
N34XX.book Page 54 Monday, September 12, 2005 5:13 PM
Summary of Contents for Lifebook N3410
Page 6: ...L i f e B o o k N S e r i e s N o t e b o o k 4 ...
Page 7: ...1 1 Preface ...
Page 8: ...2 L i f e B o o k N S e r i e s N o t e b o o k ...
Page 10: ...4 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n O n e ...
Page 11: ...5 2 Getting to Know Your Computer ...
Page 12: ...6 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n T w o ...
Page 29: ...23 3 Getting Started ...
Page 30: ...24 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n T h r e e ...
Page 37: ...31 4 User Installable Devices and Media ...
Page 38: ...32 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n F o u r ...
Page 52: ...46 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n F o u r ...
Page 53: ...47 5 Using the Integrated Wireless LAN ...
Page 54: ...48 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n F i v e ...
Page 55: ...65 6 Troubleshooting ...
Page 56: ...66 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n S i x ...
Page 72: ...64 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n F i v e ...
Page 85: ...79 7 Care and Maintenance ...
Page 86: ...80 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n S e v e n ...
Page 90: ...84 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n S e v e n ...
Page 91: ...85 8 Specifications ...
Page 92: ...86 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n E i g h t ...
Page 98: ...92 L i f e B o o k N S e r i e s N o t e b o o k ...
Page 99: ...93 9 Glossary ...
Page 100: ...94 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n N i n e ...
Page 106: ...100 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n N i n e ...
Page 110: ...100 L i f e B o o k N S e r i e s N o t e b o o k ...
Page 111: ......
Page 112: ......