5.2 Supported encryption types
The WLAN USB stick supports the following encryption
processes for preventing unauthorised access to your wireless
network:
• WPA
• WPA2
• WEP (64/ 128 bit)
Note
• WPA and WPA2 (Wi-Fi Protected Access) are the current
standards for encryption of wireless networks and the
data transmitted. Only users who know the set key can
access the wireless network.
• WEP (Wired Equivalent Privacy) is an older encryption
process and is required whenever a user in the wireless
network does not support the newer WPA/WPA2
encryption process.
• We recommend using the WPA or WPA2 encryption
process whenever possible.
5.3 Network configuration
(after successful installation)
Once you have successfully installed the WLAN USB stick on
your computer and inserted it, you can establish a connection
between a wireless network and your computer.
The WLAN USB stick allows both infrastructure mode and
ad-hoc mode.
Infrastructure mode
Wireless connection of one or more computers and other
network users to an access point is called infrastructure mode.
Access points such as WLAN routers allow functions such as
accessing the Internet or a wired network.
Network configuration via WPS
Note - WPS
• If your access point supports WPS (Wi-Fi Protected
Setup), this standard can simplify configuration of your
wireless network.
• Please refer to the instructions in the operating manual
of your terminal device.
• WPS can only be used in combination with the WPA/
WPA2 encryption processes (WEP is not supported).
• Press the WPS button at the access point (button may have
a different name) to activate the WPS function at the access
point and on the computer with the inserted WLAN USB
stick.
• The available network is automatically selected in this
process and the security data is transferred.
• You may be prompted to enter a security/network key,
password, etc.
• If necessary, follow the instructions for your operating
system.
Manual network configuration
• Select an available network.
• You may be prompted to enter a security/network key,
password, etc.
• After you have entered it correctly, the connection is
established.
• If no networks have been set up/are available, configure the
appropriate network using the settings and configurations in
the operating system you use.
Note - Configuration
• Note the information in the operating instructions for
your terminal device and operating system.
• If necessary, follow the instructions for your operating
system.
• The function LED integrated into the device flashes when
the network is accessed.
6. Care and Maintenance
• Only clean this product with a slightly damp, lint-free cloth
and do not use aggressive cleaning agents.
• Make sure that water does not get into the product.
7. Warranty Disclaimer
Hama GmbH & Co. KG assumes no liability and provides no
warranty for damage resulting from improper installation/
mounting, improper use of the product or from failure to
observe the operating instructions and/or safety notes.
7