Configuration

Regulatory

It is illegal to use this device in any location outside of the regu-

Domain

latory domain.

Station name

This is the same as the Device (Host) Name on the WAN

 

screen. On your PC, some Wireless status screens may display

 

this name as the Access Point in use.

Network Type Select the correct value for your Wireless LAN.

Infrastructure mode is used when each Wireless station connects to the Wireless Access point. This also provides access to the wired LAN.

Ad-hocmode is used when there is no Wireless Access Point, and each Wireless station communicates directly with other Wireless stations. This is the older standard.

SSID

To communicate, all Wireless stations MUST use the same

(Service Set

SSID/ESSID.

Identifier)

The default value of FPS-2PUW is null. The default value of

 

FPS-2PUWG is default.

 

Note! The SSID is case sensitive.

 

 

Channel No.

Select the value you wish to use on your Wireless LAN. If you

 

experience lost connections and/or slow data transfers you may

 

need to experiment with different channels to see which is the

 

best.

 

 

Link Info But-

Click this button will open the sub screen.

ton

 

WEP Data Privacy
WEP Encryp-

If None (default), data is NOT encrypted before being transmit-

tion

ted.

 

 

64 Bit Key

If selected, data is encrypted, using the default key, before being

 

transmitted.

 

The receiving station must be set to 64 Bit Encryption, and have

 

the same Key value in the same position in its key table. Other-

 

wise, it will not be able to decrypt the data.

 

Default Key

 

Select the key you wish to be the default. Transmitted data is

 

ALWAYS encrypted using the Default Key; the other Keys are

 

for decryption only.

 

Key Table:

 

This table is used when Encrypting and Decrypting data. All sta-

 

tions, including this Access Point, always transmit data en-

 

crypted using their default key. The key number (1, 2, 3, 4) is

 

also transmitted. The receiving station will use the key number

 

(1, 2, 3, 4) to determine which key value to use for decryption. If

 

the key value does not match the transmitting station, decryption

 

will fail.

 

The easiest way to ensure there are no problems is to have

 

every Station, including the Access Point, use the same key ta-

 

ble (all entries identical). Then, it does not matter which key is

 

used as the default key.

 

Page 48