TRENDnet TEW-P1U1P manual Configuration, WEP Data Privacy

Models: TEW-P1U1P

1 80
Download 80 pages 8.51 Kb
Page 49
Image 49

Configuration

Regulatory

It is illegal to use this device in any location outside of the regulatory

Domain

domain.

 

 

Station name

This is the same as the Device (Host) Name on the WAN screen. On

 

your PC, some Wireless status screens may display this name as the

 

Access Point in use.

 

 

SSID

To communicate, all Wireless stations MUST use the same

(ESSID)

SSID/ESSID.

 

The default value is ANY.

 

Note! The SSID is case sensitive.

 

 

Channel No.

Select the value you wish to use on your Wireless LAN. If you

 

experience lost connections and/or slow data transfers you may need to

 

experiment with different channels to see which is the best.

 

 

Network Type

Select the correct value for your Wireless LAN.

 

Ad-hocmode is used when there is no Wireless Access Point, and

 

each Wireless station communicates directly with other Wireless

 

stations.

 

Infrastructure mode is used when each Wireless station connects to

 

the Wireless Access point. This also provides access to the wired

 

LAN.

 

 

Link Info

Click this button will open the sub screen.

Button

 

 

 

WEP Data Privacy

Off

If OFF (default), data is NOT encrypted before being transmitted.

 

 

64 Bit

If selected, data is encrypted, using the default key, before being

Encryption

transmitted.

 

The receiving station must be set to 64 Bit Encryption, and have the

 

same Key value in the same position in its key table. Otherwise, it will

 

not be able to decrypt the data.

 

Default Key

 

Select the key you wish to be the default. Transmitted data is ALWAYS

 

encrypted using the Default Key; the other Keys are for decryption only.

 

Key Table:

 

This table is used when Encrypting and Decrypting data. All stations,

 

including this Access Point, always transmit data encrypted using their

 

default key. The key number (1, 2, 3, 4) is also transmitted. The

 

receiving station will use the key number (1, 2, 3, 4) to determine which

 

key value to use for decryption. If the key value does not match the

 

transmitting station, decryption will fail.

 

The easiest way to ensure there are no problems is to have every Station,

 

including the Access Point, use the same key table (all entries identical).

 

Then, it does not matter which key is used as the default key.

 

 

Page 45

Page 49
Image 49
TRENDnet TEW-P1U1P manual Configuration, WEP Data Privacy