List of Functions 85
Security menu (Only available when the optional Wireless 802.11a/b/g/ Module is installed)

When the optional Wireless 802.11a/b/g Module is installed and being used in Manual Mode, it is strongly recommended that you set security.

Sub Menu Function
Security Select one of the following security methods.
When setting up security, follow the instructions from the administrator of the network system you are about to access.
WEP: Data is encrypted with a code key (WEP key)
This mechanism prevents communication unless the encrypted keys for the access point and the projector match.
WPA/WPA2: This is an encryption standard that improves security which is a weak point of WEP. Although there are multiple kinds
of WPA encryption methods, this projector uses "TKIP" and "AES".
WPA also includes user authentication functions. WPA authentication provid es two methods: using an authentication server, or
authenticating between a computer and an access point without a server. This projector suppo rts the latter method, without a
server.
EAP: EAP is a protocol used for communication between clients and authentication severs. These are multiple protocols, such as
EAP-TLS which uses electronic certification for user authentication, L EAP which uses user name and password, and EAP-TTLS.