Page 56 / 158 Scroll up to view Page 51 - 55
52
D-Link DIR-850L User Manual
The following parameters will be available for configuration:
Wireless Band:
Displays the wireless band being config-
ured. In this option we find that the fol-
lowing parameters will be regarding the
5GHz band.
Enable Wireless:
Check the box to enable the wireless func-
tion. If you do not want to use wireless,
uncheck the box to disable all the wireless
functions. Select the time frame that you
would like your wireless network enabled.
The schedule may be set to Always. Any
schedule you create will be available in
the drop-down menu. Click New Schedule
to create a new schedule.
Wireless Network Name:
The Service Set Identifier (SSID) is the name of your wireless network. Create a name using up to 32 characters. The
SSID is case-sensitive. Enable Auto Channel
802.11 Mode:
Here the user can manually select the preferred frequency band to use for this wireless network.
Enable Auto Channel Scan:
The auto channel selection setting can be selected to allow this device to choose the channel with the least
amount of interference.
Wireless Channel:
By default the channel is set to 36. The Channel can be changed to fit the channel setting for an existing wireless
network or to customize the wireless network. If you enable Auto Channel Selection, this option will be greyed out.
Transmission Rate:
Select the transmit rate. It is strongly suggested to select Best (Automatic) for best performance.
Channel Width:
When using the 802.11n frequency band, the user have an option to choose between a 20 MHz, 20/40 MHz, or
20/40/80 MHz bandwidth.
Visibility Status:
The Invisible option allows you to hide your wireless network. When this option is set to Visible, your wireless
network name is broadcasted to anyone within the range of your signal. If you are not using encryption then they
could connect to your network. When Invisible mode is enabled, you must enter the Wireless Network Name (SSID)
on the client manually to connect to the network.
Page 57 / 158
53
D-Link DIR-850L User Manual
By default the wireless security of this router will be disabled. In this
next option the user can enabled or disable wireless security for the
frequency band 2.4GHz. There are two types of encryption that can be
used. WEP or WPA/WPA2.
Wireless Security Mode: WEP
Wired Equivalent Privacy (WEP) is the most basic form of encryption
that can be used for wireless networks. Even though it is known as a
‘weak’ security method, it is better than no security at all. Older wireless
adapter sometimes only supports WEP encryption and thus we still find
this encryption method used today.
The following parameters will be available for configuration:
WEP Key Length:
Here the user can specify to either use a
64Bit or a 128Bit encrypted key.
Authentication:
Authentication is a process by which the
router verifies the identity of a network
device that is attempting to join the wire-
less network. There are two types authen-
tication for this device when using WEP.
Open System
allows all wireless devices
to communicate with the router before
they are required to provide the encryp-
tion key needed to gain access to the
network.
Shared Key
requires any wire-
less device attempting to communicate
with the router to provide the encryption
key needed to access the network before
they are allowed to communicate with the
router.
WEP Key 1:
Enter the WEP key used here. For 64-bit keys you must enter 10 hex digits into each key box. For 128-bit keys you
must enter 26 hex digits into each key box. A hex digit is either a number from 0 to 9 or a letter from A to F. You
may also enter any text string into a WEP key box, in which case it will be converted into a hexadecimal key using
the ASCII values of the characters. A maximum of 5 text characters can be entered for 64-bit keys, and a maximum
of 13 characters for 128-bit keys.
Page 58 / 158
54
D-Link DIR-850L User Manual
Wireless Security Mode: WPA-Personal
Wi-Fi Protected Access (WPA) is the most advanced and up to date wire-
less encryption method used today. This is the recommended wireless
security option. WPA supports two authentication frameworks. Personal
(PSK) and Enterprise (EAP).
The following parameters will be available for configuration:
WPA Mode:
WPA is the older standard; select this op-
tion if the clients that will be used with the
router only support the older standard.
WPA2 is the newer implementation of the
stronger IEEE 802.11i security standard.
With the “WPA2” option, the router tries
WPA2 first, but falls back to WPA if the
client only supports WPA. With the “WPA2
Only” option, the router associates only
with clients that also support WPA2 secu-
rity.
Cipher Type:
Select the appropriate cipher type to use
here. Options to choose from are Temporal
Key Integrity Protocol (
TKIP
), Advanced
Encryption Standard (
AES
), and Both (
TKIP
and AES
).
Group Key Update Interval:
Enter the amount of time before the group
key used for broadcast and multicast data
is changed.
Pre-Shared Key:
Enter the shared secret used here. This secret phrase needs to be the same on all of the wireless clients for them to
be able to connect to the wireless network successfully.
Page 59 / 158
55
D-Link DIR-850L User Manual
Wireless Security Mode: WPA-Enterprise
Wi-Fi Protected Access (WPA) is the most advanced and up to date wire-
less encryption method used today. This is the recommended wireless
security option. WPA supports two authentication frameworks. Personal
(PSK) and Enterprise (EAP).
The following parameters will be available for configuration:
WPA Mode:
WPA is the older standard; select this op-
tion if the clients that will be used with the
router only support the older standard.
WPA2 is the newer implementation of the
stronger IEEE 802.11i security standard.
With the “WPA2” option, the router tries
WPA2 first, but falls back to WPA if the
client only supports WPA. With the “WPA2
Only” option, the router associates only
with clients that also support WPA2 secu-
rity.
Cipher Type:
Select the appropriate cipher type to use
here. Options to choose from are Temporal
Key Integrity Protocol (
TKIP
), Advanced
Encryption Standard (
AES
), and Both (
TKIP
and AES
).
Group Key Update Interval:
Enter the amount of time before the group
key used for broadcast and multicast data
is changed.
RADIUS Server IP Address:
When the user chooses to use the EAP
authentication framework, the RADIUS
server’s IP address can be entered here.
RADIUS Server Port:
When the user chooses to use the EAP authentication framework, the RADIUS server’s port number can be entered
here.
RADIUS Server Shared
Secret:
Enter the shared secret used here. This secret phrase needs to be the same on all of the wireless clients for them to
be able to connect to the wireless network successfully.
Page 60 / 158
56
D-Link DIR-850L User Manual
Wireless Security Mode: Enable WEP Wireless Security (basic)
Wired Equivalent Privacy (WEP) is the most basic form of encryption
that can be used for wireless networks. Even though it is known as a
‘weak’ security method, it is better than no security at all. Older wireless
adapter sometimes only supports WEP encryption and thus we still find
this encryption method used today.
The following parameters will be available for configuration:
Authentication:
Authentication is a process by which the
router verifies the identity of a network
device that is attempting to join the wire-
less network. There are two types authen-
tication for this device when using WEP.
Open System
allows all wireless devices
to communicate with the router before
they are required to provide the encryp-
tion key needed to gain access to the
network.
Shared Key
requires any wire-
less device attempting to communicate
with the router to provide the encryption
key needed to access the network before
they are allowed to communicate with the
router.
WEP Encryption:
Here the user can specify to either use a
64Bit or a 128Bit encrypted key.
Default WEP Key:
Select the default WEP key number that will be used for the encryption.
WEP Key:
Enter the WEP key used here. For 64-bit keys you must enter 10 hex digits into each key box. For 128-bit keys you
must enter 26 hex digits into each key box. A hex digit is either a number from 0 to 9 or a letter from A to F. You
may also enter any text string into a WEP key box, in which case it will be converted into a hexadecimal key using
the ASCII values of the characters. A maximum of 5 text characters can be entered for 64-bit keys, and a maximum
of 13 characters for 128-bit keys.

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top