Practically Networked Home Earthweb HardwareCentral earthwebdeveloper CrossNodes Datamation
Welcome to PractiallyNetworked
Product Reviews

 • Routers
 • Hubs/Switches
 • Wireless Gateway
 • Wireless AP
 • Wireless NIC
 • Network Storage
 • Print Servers
 • Bluetooth Adapters
& Tutorials

 • Networking
 • Internet Sharing
 • Security
 • Backgrounders
 • Troubleshooting

 • PracNet How To's
User Opinions
Practicallynetworked Glossary

 Find a Network Term  

  Most Popular Tutorials

• Microsoft Vista Home Networking Setup and Options
The most daunting part of upgrading to Windows Vista may be trying to figure out where in the layers of menus the networking and file-sharing options are hidden.

• Do It Yourself: Roll Your Own Network Cables
It may not be something you do everyday, but having the supplies and know-how to whip up a network cable on the spot can be very handy.

• Tips for Securing Your Home Router
Seemingly minor and easily overlooked settings can still have profound security implications. Here are some steps you can take to make sure your wired or wireless home router and by extension, your network is as secure as possible.

  Most Popular Reviews

• Microsoft Windows Home Server
If you have a home network, you'll welcome the easy file sharing, remote access and the image-based backup features of Windows Home Server.

• Iomega StorCenter Network Hard Drive
Iomega's fourth generation StorCenter Network Hard Drive brings many of the features found in higher-end storage devices down to an attractive price.

• MikroTik's The Dude
This free tool delivers many of the same capabilities that you'd find in pricey network monitoring tools. As long as you don't mind tinkering, The Dude is a decent network utility that should be worth the download.

SW Proxy Servers  
NAT SW (ICS, Sygate, etc)
NAT HW Routers
Other Problems
Secure LAN
Special Applications
Other Help

If you're having trouble getting a successful connection in your wireless network, it could be your encryption settings.  Try these tips to get securely connected:

1) Start with Encryption off (if you can)
Encryption is another level of complexity (see below) and you need to reduce complexity (walk before you run) when first setting up your wireless LAN.  So see if your client card and Access Point (if you're using one) will allow Encryption to be turned off (most do), get your networking, then set up Encryption.  You may also need to set the Authentication Type for some equipment. See Step 3 below.

2) Read the instructions
Your vendor may require a specific number of characters for the Encryption key.  They may also interpret the characters you input in a specific way. 

Look to see if you need to specify whether your key is an ASCII string (alpha-numeric) or Hexadecimal (Hex). If the key can accept Hexadecimal format, check to see whether you need to add anything to your key such as "0x" to denote a hex string.

3) Watch your Authentication Method
The 802.11 standard defines two types of Authentication - Open System and Shared Key. This Proxim article has a good explanation (with diagrams) of the difference between the two methods.  Some products let you set this mode independently of using WEP.  Others automatically use Open System if WEP is disabled and use Shared Key when WEP is enabled.

If you're having a problem communicating between a client and Access Point, first try using the Open System setting and WEP off.  When you enable WEP, change the setting to use Shared Key authentication for the best security.

4) Match WEP bit levels
You can mix 40/64 and 128bit WEP cards in a network.  However, 128 bit WEP cards can communicate with 40/64 bit WEP cards only if they are set to use 40 bit keys!  See this page for more info.

5) Keep It Simple!
WEP implementations differ from vendor to vendor and documentation isn't the best.  Here are some tips for success

If your software offers the "passphrase" method of key generation:

  • keep the passphrase string short

  • use only numbers and letters and no spaces or other characters

The "passphrase" key entry method is not the same as "string" entry.  The "passphrase" method allows you to enter an alpha-numeric phrase, but that entry is used to generate a Hexadecimal key of proper length.  

entry usually requires that you input a an alpha-numeric character string of the proper length for the level of WEP that your product has.  Use the pop-up WEP code summary for reference.


If your software offers only manual key entry (usually you'll see a series of two character entry boxes):

  • start with all 1s or 0s as your key, get it working, then increase the complexity of your code

  • use Hexadecimal characters only (the numbers 0-9 and letters a-f) unless your documentation tells you otherwise

6) Enter all the characters

Note in the example configuration utility screenshot below the pairs of asterisks in each of the 5 entry boxes for each key.  This means that you need to enter two Hexadecimal characters in each box (5 boxes with 2 characters equals the 10 Hex characters you need for a 40/64bit WEP Hex key). Popup the WEP Code Summary to see how many characters you need to enter for other schemes.

40/64 bit WEP entry example


Wireless Encryption Overview

Mixing WEP Levels

PopUp WEP Code Reference Earthweb HardwareCentral earthwebdeveloper CrossNodes Datamation

Home | Networking | Backgrounders | Internet Sharing | Security | HowTo | Troubleshooting | Reviews | News | About | Jobs | Tools | Forums