Harmony House 802.11a Network Card User Manual


 
Harmony Utility 45
To create the text file, use a text program such as Microsoft Notepad or WordPad. The
text file should have a “.txt” extension. The first line of the text file must read
“[WEP_KEY_VALUE]”. Then, enter one to four Keys in the following format:
“key#=<key value>”, where
#
indicates the Key number (1-4) and
<key value>
is the
specified Key’s hexadecimal digits.
Each Key must be contain hexadecimal digits only (0-9 and A-F), and you must use the
same number of digits for each Key. The number of digits depends upon the Key Size
you select in the WEP Keys Configuration screen:
• For 64 Bit, use 10 digits per Key.
• For 128 Bit, use 26 digits per Key.
• For 152 Bit, use 32 digits per Key.
The following example illustrates the WEP Key file format for 64-bit encryption:
[WEP_KEY_VALUE]
key1=1234567890
key2=0987654321
key3=ABCDEF1234
key4=ABCDEFABCD
Harmony Security Protocol
Follow these steps to enable the Harmony Security Protocol:
Note: The Harmony Security Protocol is not available on computers running
Windows 2000 Server or Windows NT.
1. Select Use Harmony Security Protocol within the Security Level box.
2. Place a check mark in the Log on to Harmony Security before Windows Logon box
if you want to connect to the wireless network before logging on to the Windows
operating system.
Note: You should enable the Log on to Harmony Security before Windows Logon
option if your computer connects to a Windows Domain Controller, connects
to a Novell network, automatically reconnects to shared network drives dur-
ing Windows logon, or runs networking software (e.g., PC Anywhere) before
connecting to the network.