Page 21 / 37 Scroll up to view Page 16 - 20
20
Authentication:
One of the following authentication modes should be selected if WEP
security method is used:
Open System
station is authenticated automatically by AP.
Shared Key
station is authenticated after the challenge, generated by AP.
Encryption:
64-bit (selected by default) or 128-bit WEP Key length should be selected.
The 128-bit option will provide a bit higher level of wireless security.
For 64-bit
specify WEP key as 10 Hex (0-9, A-F or a-f) characters (e.g. 00112233AA)
or 5 ASCII characters.
For 128-bit
specify WEP key as 26 Hex (0-9, A-F or a-f) characters (e.g.
00112233445566778899AABBCC) or 13 ASCII characters.
Encryption Key:
set a password for this router
s wireless connection.
5.3.2.2 WPA/WPA2
WPA2 means Wi-Fi Protected Access 2, it is the current most secure method of wireless
security and required for 802.11n performance. Please set one Encryption key (password)
for your wireless network to prevent being occupied by others.
WPA2:
it means Wi-Fi Protected Access 2, it is the current most secure method of wireless
security and required for 802.11n performance. This mode allows you to choose
TKIP+AES
Algorithm.
WPA Algorithms
TKIP
--Temporal Key Integrity Protocol is one cipher for data encryption supported by
WPA.
AES
--also know as CCMP, Counter Mode with Cipher Block Chaining Message
Authentication Code Protocol, which uses the Advanced Encryption Standards (AES)
algorithm.
Page 22 / 37
21
Encryption key:
This is a pre-defined key used for encryption during data transmission. It
has two formats: Passphrase and Hex (64 characters). Then you need to enter the
Pre-Shared Key, either 8~63 ASCII characters, such as 012345678 (or 64 Hexadecimal
digits leading by 0x,
such as “0x321253abcde…”).
5.3.3 Repeater Setup
The Repeater methods can help you to expand the wireless coverage and allow more
terminals to access Internet.
Repeater Bridge/Repeater WAN
Wireless Repeater Network Name (SSID):
Click
Scan AP
to choose the SSID you want
to implement the repeater function.
Bridge MAC Address:
or you can enter the MAC address.
Channel:
select one channel according to the main Router and your method.
Upper/Lower:
you can keep it the default setting.
Authentication:
select one encryption method for this repeater function.
Encryption:
please refer to
Wireless Basic Settings
.
Note:
Since WEP has been proved vulnerable, you may consider using WPA2 for the most secure
connection. You should select the appropriate security mechanism according to your needs. No
matter which security suite you select, they all will enhance the over-the-air data protection and/or
privacy on your wireless network.
Page 23 / 37
22
5.3.4 Multiple APs
Wireless Network Name (SSID):
define one more SSID for your WLAN.
SSID Broadcast:
choose to enable or disable this function.
Authentication:
please choose one encryption method for this SSID.
Encryption:
please refer to
Wireless Basic Settings
.
5.3.5 MAC Authentication
You can control the number of PCs to connect with the wireless Router through MAC
authentication
5.3.6 WDS Setup
WDS means Wireless Distribution System. It is a protocol for connecting two access points
wirelessly. Usually, it can be used for the following application:
Provide bridge traffic between two LANs though the air.
Extend the coverage range of a WLAN.
To meet the above requirement, you must set these APs in the same channel and set MAC
address of other APs which you want to communicate with in the table and then enable the
Page 24 / 37
23
WDS.
5.3.7 WPS Setup
WPS
(Wi-Fi Protected Setup)
provides easy procedure to make network connection
between wireless station and wireless access point with the encryption of WPA and WPA2.
Pin Number:
if you choose to configure WPS by PIN, then set the Pin number here.
PBC:
you can choose this option as well.
Page 25 / 37
24
5.3.8 Advanced Setup
BG Protection Mode:
Background Protection Mode, by default, it is Auto selected.
Basic Data Rates:
you can choose the wireless data rate. This router provides three
options. Be default, it is Default (1-2-5.5-11Mbps).
Beacon Interval:
By default, it is set to 100ms. Higher Beacon interval will improve the
device’s wireless performance and is also power
-saving for client side. If this value set
lower than 100ms, it will speed up the wireless client connection.
Data Beacon Rate (DTIM):
by default, its value is 1.
Fragment Threshold:
specifies the maximum size for a packet before data is fragmented
into multiple packets. The range is 256-2346 bytes. Setting the Fragment Threshold too low
may result in poor network performance. The use of fragment can increase the reliability of
frame transmissions. Because of sending smaller frames, collisions are much less likely to
occur. However, lower values of the Fragment Threshold will result in lower throughput as
well. Minor or no modifications of the Fragmentation Threshold value is recommended
while default setting of 2346 is optimum in most of the wireless network use cases.
RTS Threshold:
determines the packet size of a transmission and, through the use of an
access point, helps control traffic flow. The range is 0-2347 bytes. The default value is 2347,
which means that RTS is disabled.
RTS/CTS
(Request to Send / Clear to send) are the mechanism used by the 802.11
wireless networking protocols to reduce frame collisions introduced by the hidden
terminal problem. RTS/CTS packet size threshold is 0-2347 bytes. If the packet size the

Rate

4 / 5 based on 1 vote.

Popular Totolink Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top