52
L i f e B o o k N S e r i e s N o t e b o o k - S e c t i o n F i v e
Configuration of the WLAN Device
The WLAN device can be configured to establish wire-
less network connectivity using the Intel PROSet for
Wireless utility. The Intel PROSet for Wireless utility
allows for multiple profile setup and supports automatic
profile switching. Support for most industry standard
security solutions is contained in this software.
FLOW OF OPERATIONS
1.
Activate the WLAN Device (See Activating the
WLAN Device on page 51 for more information).
2.
Configure the Wireless Network parameters (See
Configuration Using Intel PROSet for Wireless
Utility, below).
■
Enter the network name (SSID)
■
Choose the appropriate WLAN architecture (Ad
Hoc or Infrastructure)
■
Choose Authentication method: Open, Shared,
WPA-Enterprise, WPA2-Enterprise, WPA-
Personal, or WPA2-Personal.
■
If using static WEP keys, enter static WEP key and
choose key index.
3.
Configure network settings
■
TCP/IP settings
■
Workgroup or Domain settings.
CONFIGURATION USING
INTEL PROSET FOR WIRELESS UTILITY
This section explains the procedure to properly
configure the WLAN device using the Intel PROSet for
Wireless utility. Pre-defined parameters will be required
for this procedure. Please consult with your network
administrator for these parameters:
Network Name
- Also known as the SSID
Network Key (WEP)
- Required if using static WEP
keys.
Authentication Typ
e - Open, Shared, WPA, or WPA-
PSK
Procedure
1.
Activate the WLAN device using either the Wireless
On/Off Switch or the Intel PROSet for Wireless
utility. Note that if using Intel PROSet to activate
the device, the switch must be turned on first.
2.
Click the [Start] button first and then [All Pro-
grams].
3.
Click the icon [Intel PROSet Wireless] to execute
the Intel PROSet for Wireless utility.
4.
Click the [Add] button. The General Settings dialog
displays.
5.
Enter a profile name in the Profile Name field.
6.
Enter the network SSID, in the Network Name
(SSID) field.
7.
Click Infrastructure or Ad Hoc for the operating
mode.
8.
Click [Advanced].
9.
The Mandatory Access Point option is only used if
Infrastructure mode is selected. Use this option to
connect to a specific access point. Enter the MAC
address for the access point. Click OK to save the
setting and return to the General Settings page.
10. Click [Next].
11. If you are using Cisco CCX, click Cisco Options to
enable Cisco CKIP data encryption on the Security
Settings page. Check the Cisco Compatible Exten-
sions Options. If you have checked the Cisco's
"Mixed-Cell" box in the Advanced Setting, this
option must also be checked.
12. Click [OK].
13. Click Next.
14. Select Open, Shared, WPA-Enterprise, WPA2-
Enterprise, WPA-Personal, or WPA2-Personal in
the Network Authentication options.
15. Select either None, WEP, CKIP (if Enable Cisco Cli-
ent eXtentions is enabled, use CKIP or WEP), or
TKIP for the data encryption.
16. If WEP is selected, select either 64 or 128-bit for the
Encryption Level.
17. Select the key index 1, 2, 3 or 4.
18. Enter the WEP key if required. If your network does
not employ a 802.1x/EAP security mechanism,
please skip to step 24.
19. Click the Enable 802.1x checkbox to enable the
802.1x security option. Please contact your network
administrator if configuration of this setting is
required.
20. Select the appropriate Authentication Type. Please
contact your network administrator if configura-
tion of this setting is required.
N3510.book Page 52 Tuesday, January 18, 2005 11:05 AM
Summary of Contents for LifeBook N3500
Page 6: ...L i f e B o o k N S e r i e s N o t e b o o k 4 ...
Page 7: ...1 1 Preface ...
Page 8: ...2 L i f e B o o k N S e r i e s N o t e b o o k ...
Page 10: ...4 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n O n e ...
Page 11: ...5 2 Getting to Know Your Computer ...
Page 12: ...6 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n T w o ...
Page 30: ...24 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n T w o ...
Page 31: ...25 3 Getting Started ...
Page 32: ...26 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n T h r e e ...
Page 39: ...33 4 User Installable Devices and Media ...
Page 40: ...34 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n F o u r ...
Page 53: ...47 5 Using the Integrated Wireless LAN ...
Page 54: ...48 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n F i v e ...
Page 67: ...61 6 Troubleshooting ...
Page 68: ...62 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n S i x ...
Page 81: ...75 7 Care and Maintenance ...
Page 82: ...76 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n S e v e n ...
Page 85: ...79 8 Specifications ...
Page 86: ...80 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n E i g h t ...
Page 92: ...86 L i f e B o o k N S e r i e s N o t e b o o k ...
Page 93: ...87 9 Glossary ...
Page 94: ...88 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n N i n e ...
Page 100: ...94 L i f e B o o k N S e r i e s N o t e b o o k S e c t i o n N i n e ...
Page 104: ...98 L i f e B o o k N S e r i e s N o t e b o o k ...