7.Set the Network Authentication to Open or Shared. Refer to the table below for a comparison of the network authentication methods.
Network authentication methodsM e t h o d | Description |
O p e n | The |
| its operating range. |
|
|
S h a r e d | Only wireless device(s) with the same encryption are allowed connection |
| to the |
|
|
9.When you enable Data Encryption, select the Wired Equivalent Privacy (WEP) encryption Key Format and Key Length, then select the generation mode.
Refer to the next page for ways on how to set the WEP encryption keys.
Assign the WEP keys then click
Next.3 - 12 | Chapter 3: |