ZyXEL
The following table describes the labels in this screen.
Table 19 Access Point Mode: Configuration
LABEL | DESCRIPTION |
|
|
Wireless Settings |
|
|
|
SSID | The SSID identifies the wireless network to which a wireless station is associated. |
| Wireless stations associating to the access point (the |
| same SSID. |
| Enter a descriptive name (up to 32 printable |
| wireless LAN. |
Hide SSID | Select this check box to hide the SSID so an intruder cannot obtain the SSID |
| through scanning using a site survey tool. |
Channel | Set the operating frequency/channel depending on your geographical region. |
|
|
Output Power | Set this field if you need to conserve power consumption (especially for notebook |
| computers). This control changes the strength of the |
| transmission power. Antenna gain, measured in dBm (decibel relative units |
| compared to milliwatts), is the increase in coverage. Higher antenna gain improves |
| the range of the signal for better communications. |
| Select High to set the |
| Select |
| Select |
| Select Low to set the |
| least power consumption. |
Bridge | Select the check box and an Ethernet adapter (network interface card (NIC)) on |
| your computer from the |
| wireless network to the specified wired network. |
Security Settings |
|
|
|
WEP | Select 64 Bits, 128 Bits or 256 Bits to activate WEP encryption and then fill in the |
| related fields. |
| Select Disable to deactivate the WEP encryption. |
|
|
Authentication | Select an authentication method. Choices are Auto, Shared Key and Open |
Type | System. |
| Refer to Section 3.2.3.1.2 on page 39 for more information. |
|
|
Pass Phrase | When you select the radio button, enter a passphrase of up to 63 |
| printable characters. As you enter the passphrase, the |
| generates four different WEP key and displays it in the key field below. Refer to |
| Section 3.2.3.1 on page 39 for more information. |
| At the time of writing, you cannot use passphrase to generate |
|
|
Transmit Key | Select a default WEP key to use for data encryption. The key displays in the field |
| below. |
76 | Chapter 5 Access Point Mode Configuration |