Version 1.1 |
Authentication Type: select an authentication method. Options available are Open System, Shared Key or Auto. An open system allows any client to authenticate as long as it conforms to any MAC address filter policies that may have been set. All authentication packets are transmitted without encryption. Shared Key sends an unencrypted challenge text string to any device attempting to communicate with the AP. The device requesting authentication encrypts the challenge text and sends it back to the access point. If the challenge text is encrypted correctly, the access point allows the requesting device to authenticate. It is recommended to select Auto if you are not sure which authentication type is used.
Fragment Threshold: Packets over the specified size will be fragmented in order to improve performance on noisy networks.
RTS Threshold: Packets over the specified size will use the RTS/CTS mechanism to maintain performance in noisy networks and preventing hidden nodes from degrading the performance.
Beacon Interval: Beacons will be sent out to devices at the specified intervals. This value is measured in milliseconds (ms).
ACK Timeout: You may specify a value for the acknowledge timeout.
63