Motorola WU830G manual Security Example

Models: WU830G

1 59
Download 59 pages 20.07 Kb
Page 16
Image 16

SECTION 2

INSTALLATION

 

 

Security Example

If you want to use a more secure protocol, the wireless network to which you are connecting must also support that protocol. For example, let’s say you decide to enable WPA-PSK on your WU830G. However, the slightly older wireless network you want to connect to only supports WEP, which means that you cannot use WPA (and should use WEP) because the security protocols must match between the WU830G and the access point.

For additional information about the options supported by the WU830G, refer to Section 3, Configuration.

2-4

WU830G

Page 16
Image 16
Motorola WU830G manual Security Example