Figure
Choose the Authorization Modes and Encryption Method in the
Figure
Click the Configure WEP Keys button to continue.
Figure
18
Figure
Choose the Authorization Modes and Encryption Method in the
Figure
Click the Configure WEP Keys button to continue.
Figure
18