2 SpeedTouch™ Local Networking Setup
Antennas The SpeedTouch™580 features two antennas: one internal and one external. For transmission of data, the external antenna is always used; whereas for reception of data, the SpeedTouch™580 automatically selects the antenna which receives the optimal signal.
The external antenna can be directed to allow for the optimization of the wireless link. The antenna characteristics are such that wireless links perpendicular to the antenna are favoured. I.e. when the antenna is erect, wireless links in the horizontal plane are favoured. Please note that the antenna characteristics are influenced by the environ- ment, i.e. by reflections of the radio signal against walls or ceilings. It is advised to use the received signal strength as indicated by the wireless client manager to optimize the antenna position for the link to a given client.
Wireless security Since the SpeedTouch™ wireless environment is a radio environment, precautions must be taken to ensure that your wireless network is safe from malicious intruders. In addition to providing the possibility of giving a personalized Network Name (SSID) to the wireless network, the SpeedTouch™ features a physical registration mechanism, a managed Access Control List (ACL) and the possibility to select different levels of secu- rity:
•Level 0 (The default): No security i.e. the data will not be encrypted, no authenti- cation process will be used.
•Level 1: Backwards compatible security with any
Note The default 64 bits hexadecimal WEP key is for your convenience printed on the identification label located at the bottom of the Speed- Touch™580 and is unique for each device.
•Level 2:
Note The default
Level 1 This level uses Wired Equivalent Protocol (WEP) to provide wireless security that is compatible with any
WEP relies on a secret key that is shared between the wireless client (e.g. a laptop with a wireless client and the SpeedTouch™580). The fixed secret key is used to encrypt data before they are transmitted. I.e. during transmission between client and access point (“in the air”) the information in the packets is encrypted.
17 | |
|