Page 51 / 108 Scroll up to view Page 46 - 50
ENHWI-2AN3 User’s Manual
Encore Electronics Inc.
Tel – (626) 336-4567
Fax – (626) 336-2345
Web Site – www.encore-usa.com
51
CTS Protection:
It is recommended to enable the protection mechanism. This
mechanism can decrease the rate of data collision between
802.11b and 802.11g wireless stations. When the protection
mode is enabled, the throughput of the AP will be a lower due
to an increase of data frame transmission.
TX Power:
10% to 100%. Default value is 100%.
-
Security
ENHWI-2AN3 provides complete wireless LAN security types. Selections are
WEP, IEEE 802.1x, IEEE 802.1x with WEP, WPA with pre-shared key or PSK
and WPA with RADIUS. With these wireless securities, unauthorized access can
be prevented. Make sure all other wireless stations use the same security type,
and were setup with the same security key.
Page 52 / 108
ENHWI-2AN3 User’s Manual
Encore Electronics Inc.
Tel – (626) 336-4567
Fax – (626) 336-2345
Web Site – www.encore-usa.com
52
ESSID Selection: ENHWI-2AN3
router supports multiple ESSID, you can name your
wireless ESSID here.
Broadcast ESSID:
If you enabled “Broadcast ESSID”, every wireless station located
within the coverage of this Router can see this ESSID. If you are
building a public wireless network, enabling this feature is
recommended. Disabling “Broadcast ESSID” can provide better
security.
WMM:
Wi-Fi Multi Media if enabled supports QoS to dedicate line and other resource
for better audio, video and voice streaming to a particular station and
applications.
Encryption:
If set to Disable, the router will have no protection against uninvited
wireless guests, your LAN will be prone to hackers. It is highly
recommended to Enable this function and set your own wireless
security.
Enable 802.1x Authentication
IEEE 802.1x is an authentication protocol using RADIUS server. When this is
Enabled, every LAN user must use an account to login to this Access Point
before accessing the wireless LAN. The authentication is processed by a
RADIUS server. This mode only authenticates users by IEEE 802.1x, but it does
not encrypt the data during communication.
Page 53 / 108
ENHWI-2AN3 User’s Manual
Encore Electronics Inc.
Tel – (626) 336-4567
Fax – (626) 336-2345
Web Site – www.encore-usa.com
53
WEP Encryption
When you select 64-bit or 128-bit WEP key, you have to enter WEP keys to
encrypt data. You can generate the key by yourself. You can enter up to four
WEP keys and select one of them as a default key. The AP can receive any
packet encrypted by one of the four keys.
Page 54 / 108
ENHWI-2AN3 User’s Manual
Encore Electronics Inc.
Tel – (626) 336-4567
Fax – (626) 336-2345
Web Site – www.encore-usa.com
54
Authentication Type:
There are two authentication types:
"Open System"
and
"Shared Key"
. Both AP and wireless client must be
configured with the same authentication type.
Key Length:
You can select the WEP key length for encryption, 64-bit or 128-bit.
The larger the key will be the higher level of security is used, but
the throughput will be lower.
Key Type:
You may select ASCII Characters (alphanumeric format) or
Hexadecimal Digits (in the "A-F", "a-f" and "0-9" range) to be the
WEP Key.
Default Key:
It’s the key used to encrypt data.
Page 55 / 108
ENHWI-2AN3 User’s Manual
Encore Electronics Inc.
Tel – (626) 336-4567
Fax – (626) 336-2345
Web Site – www.encore-usa.com
55
Key1 - Key4:
The WEP keys are used to encrypt data transmitted in the wireless
network. Use the following rules to setup a WEP key on the
device.
64-bit WEP:
input 10-digits Hex values (in the "A-F", "a-f" and "0-9" range)
or 5-digit ASCII character as the encryption keys.
128-bit WEP:
input 26-digit Hex values (in the "A-F", "a-f" and "0-9" range)
or 13-digit ASCII characters as the encryption keys.
Click
<Apply>
at the bottom of the screen to save the above configurations.
WPA Pre-Shared Key Encryption
Wi-Fi Protected Access (WPA) is an advanced security standard. You can use a
pre-shared key to authenticate wireless stations and encrypt data during
communication. It uses TKIP or CCMP (AES) to change the encryption key
frequently. The encryption key is not easy to be cracked by hackers. This is the
best security available.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top