Solved

Wireless connection with Open or Shared Auth Type

Posted on 2007-03-20
3
215 Views
Last Modified: 2010-03-17
WinXP SP2, 64bit WEP keys connects fine when i select the Auth type "Open" but not on "Shared", and if i changed into "WPA-PSK" not able to connect, only connects on WEP "OPEN" connection.

I get error something no wireless found, out of range

What is difference in Open and Shared? and why its connecting on Open?
0
Comment
Question by:joy333
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 8

Accepted Solution

by:
thur6165 earned 30 total points
ID: 18760828
http://www.experts-exchange.com/Networking/Misc/Q_21459081.html

Not being able to use one or the other might have somlthing to do with the compatablility of the devices you are using.  
0
 
LVL 11

Assisted Solution

by:jekl2000
jekl2000 earned 20 total points
ID: 18762856
Open means that WEP is used (if selected) but anyone can use the network.
Shared means that both the Access Point and the wireless client require having have a matching key before association of the two devices.
There must be a problem between the key in your PC and the key in the Access Point.

What kind of AP and wireless card are you using....

0
 
LVL 17

Expert Comment

by:kadadi_v
ID: 18763384
which router you are using pls give the details.



Reards,

V.K.
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I'm a big fan of Windows' offline folder caching and have used it on my laptops for over a decade.  One thing I don't like about it, however, is how difficult Microsoft has made it for the cache to be moved out of the Windows folder.  Here's how to …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question