Configuration |
|
|
|
Regulatory | It is illegal to use this device in any location outside of the regulatory |
Domain | domain. |
|
|
Station name | This is the same as the Device (Host) Name on the WAN screen. On |
| your PC, some Wireless status screens may display this name as the |
| Access Point in use. |
|
|
SSID | To communicate, all Wireless stations MUST use the same |
(ESSID) | SSID/ESSID. |
| The default value is null. |
| Note! The SSID is case sensitive. |
|
|
Channel No. | The default Channel for the USA and Canada is 3. |
| Select the value you wish to use on your Wireless LAN. If you |
| experience lost connections and/or slow data transfers you may need to |
| experiment with different channels to see which is the best. |
|
|
Network Type | Select the correct value for your Wireless LAN. |
| ∙ 802.11 |
| Point, and each Wireless station communicates directly with other |
| Wireless stations. This is the current standard. |
| ∙ |
| each Wireless station communicates directly with other Wireless |
| stations. This is the older standard. |
| ∙ Infrastructure mode is used when each Wireless station connects to |
| the Wireless Access point. This also provides access to the wired |
| LAN. |
|
|
Link Info | Click this button will open the sub screen. |
Button |
|
|
|
WEP Data Privacy | |
|
|
Off | If OFF (default), data is NOT encrypted before being transmitted. |
|
|
64 Bit | If selected, data is encrypted, using the default key, before being |
Encryption | transmitted. |
| The receiving station must be set to 64 Bit Encryption, and have the |
| same Key value in the same position in its key table. Otherwise, it will |
| not be able to decrypt the data. |
| Default Key |
| Select the key you wish to be the default. Transmitted data is ALWAYS |
| encrypted using the Default Key; the other Keys are for decryption only. |
| Key Table: |
| This table is used when Encrypting and Decrypting data. All stations, |
| including this Access Point, always transmit data encrypted using their |
| default key. The key number (1, 2, 3, 4) is also transmitted. The |
| receiving station will use the key number (1, 2, 3, 4) to determine which |
| key value to use for decryption. If the key value does not match the |
| transmitting station, decryption will fail. |
| The easiest way to ensure there are no problems is to have every Station, |
| including the Access Point, use the same key table (all entries identical). |
| Then, it does not matter which key is used as the default key. |
|
|
| Page 41 |