Using the Web-Based Advanced User Interface
The example below illustrates using Repeater mode to extend the range of your wireless network. In this example, the WURE is set up to connect to the wireless router located in another area.
| Wireless G |
| Universal Range |
Wireless G | Extender |
| |
Desktop Card | Wireless G |
| Notebook Card |
�����������������������
Wireless G
Router
Note: Laptops can roam or move between the two wireless coverage areas if the SSID and the parent access point’s SSID match.
Securing your Wi-Fi® Network
Here are a few different ways you can maximize the security of your wireless network and protect your data from prying eyes and ears. This section is intended for the home,
| With Protected | ||||
Name | Equivalent | Equivalent Privacy | Access | ||
Privacy |
|
|
| ||
|
|
|
| ||
Acronym | |||||
Security | Good | Better | Best | Best | |
|
|
| Dynamic key | Dynamic key | |
Features | Static keys | Static keys | encryption | encryption | |
and mutual | and mutual | ||||
|
|
| |||
|
|
| authentication | authentication | |
|
| More secure than | TKIP (temporal |
| |
| Encryption | key integrity | AES (Advanced | ||
| keys based on | a key length of | protocol) added | Encryption | |
| RC4 algorithm | 104 bits plus 24 | so that keys | Standard) does | |
| (typically | additional bits of | are rotated and | not cause any | |
| encryption is | throughput loss | |||
|
| data | strengthened |
|
24