GE VOLUSON
i / VOLUSON
e
D
IRECTION KTI106052, REVISION 10 SERVICE MANUAL
3-114 Section 3-11 - Connectivity Setup
3-11-1-7-3 Setting Security Parameters
The “Profile Management - Security” window (see: Figure 3-133 below) enables to set parameters
that control how the client adapter associates to an access point, authenticates to the wireless
network, and encrypts and decrypts data.
To access this window, click the
SECURITY tab from any Profile Management window.
This window includes many security features, each of which involves a number of steps.
You can protect your data as it is transmitted through your wireless network by encrypting it through
the use of wired equivalent privacy (WEP) encryption keys. The security features themselves are
complex and need to be understood before they are implemented.
Table 3-21 Profile Management Advanced Parameters (cont´d)
Parameter Description
Wireless Mode
Specifies the frequency and rate at which your client adapter should transmit packets to or receive
packets from access points.
Default: All options selected
Note: When more than one option is selected, the client adapter attempts to use the wireless modes in
this order: 5 GHz 54 Mbps, 2.4 GHz 54 Mbps, 2.4 GHz 11 Mbps.
Note: Your client adapter’s wireless mode must match that of the access points with which it is to
communicate. Otherwise, your client adapter may not be able to associate to them
802.11
Authentication
Mode
Specifies how your client adapter attempts to authenticate to an access point.
Default: Open
Open: Enables your client adapter, regardless of its WEP settings, to authenticate and attempt to communicate with an
access point. However, communication can occur only if the adapter’s WEP key matches that of the access point.
Note: Cisco recommends that Auto and Shared not be used because they present a security risk.
Figure 3-133 Profile Management - Security
!! CAUTION:
WLAN security has to be adjusted to prevent viruses and to ensure data protection. Discuss
settings with the hospital´s network administrator. He must provide the required information.