|
| Chapter 8 Wireless Screen |
| Table 24 Wireless: Bridge / Repeater | |
| LABEL | DESCRIPTIONS |
| Output Power | Set the output power of the NWA in this field. If there is a high |
|
| density of APs in an area, decrease the output power of the NWA to |
|
| reduce interference with other APs. Select from 100% (Full |
|
| Power), 50%, 25%, 12.5% and Minimum. See the product |
|
| specifications for more information on your NWA’s output power. |
|
| Note: Reducing the output power also reduces the NWA’s |
|
| effective broadcast radius. |
|
|
|
| Rates | This section controls the data rates permitted for clients. |
| Configuration | For each Rate, select an option from the Configuration list. The |
|
| |
|
| options are: |
|
| • Basic (1~11 Mbps only): Clients can always connect to the |
|
| access point at this speed. |
|
| • Optional: Clients can connect to the access point at this speed, |
|
| when permitted to do so by the AP. |
|
| • Disabled: Clients cannot connect to the access point at this |
|
| speed. |
|
|
|
| MCS Table | The MCS Rate table is available only when 802.11n/g or |
|
| 802.11n/a is selected as the 802.11 Radio Mode. |
|
| IEEE 802.11n supports many different data rates which are called |
|
| MCS rates. MCS stands for Modulation and Coding Scheme. This is |
|
| an 802.11n feature that increases the wireless network performance |
|
| in terms of throughput. |
|
| For each MCS Rate |
|
| NWA use the data rate. Select Disable if you do not want the NWA |
|
| to use the data rate. |
|
|
|
| Enable WDS | Select this to turn on security for the NWA’s Wireless Distribution |
| Security (ZyAIR | System (WDS). A Wireless Distribution System is a wireless |
| PRO Series | connection between two or more APs. If you do not select the check |
| Compatible) | box, traffic between APs is not encrypted. |
|
| Note: WDS security is independent of the security settings |
|
| between the NWA and any wireless clients. |
|
| When you enable WDS security, also do the following: |
|
| • Select the type of security you want to use (TKIP or AES) to |
|
| secure traffic on your WDS. |
|
| • Enter a |
|
| your WDS. Each access point can use a different |
|
| • Configure WDS security and the relevant PSK in each of your |
|
| other access point(s). |
|
| Note: Other APs must use the same encryption method to |
|
| enable WDS security. |
|
|
|
| 131 |
|
|