Page 26 / 59 Scroll up to view Page 21 - 25
26
RTS Threshold
When the packet size is smaller then the RTS threshold,
the wireless router will not use the RTS/CTS mechanism to send this
packet.
Beacon Interval
is the interval of time that this wireless router
broadcasts a beacon. A Beacon is used to synchronize the wireless
network.
Data Rate
The “Data Rate” is the rate that this access point uses to
transmit data packets. The access point will use the highest possible
selected transmission rate to transmit the data packets.
N Data Rate
The “Data Rate” is the rate that this access point uses to
transmit data packets for N compliant wireless nodes. Highest to lowest
data rate can be fixed.
Channel Bandwidth
is the range of frequencies that will be used.
Preamble Type
The “Long Preamble” can provide better wireless LAN
compatibility while the “Short Preamble” can provide better wireless LAN
performance.
Broadcast ESSID
If you enabled “Broadcast ESSID”, every wireless
station located within the coverage of this access point can discover this
access point easily. If you are building a public wireless network, enabling
this feature is recommended. Disabling “Broadcast ESSID” can provide
better security.
CTS Protection:
It is recommended to enable the protection mechanism.
This mechanism can decrease the rate of data collision between 802.11b
and 802.11g wireless stations. When the protection mode is enabled, the
throughput of the AP will be a little lower due to a lot of frame-network
that is transmitted.
TX Power
can be set to a bare minimum or maximum power.
WMM
WiFi Multi Media if enabled supports QoS for experiencing better
audio, video and voice in applications.
Page 27 / 59
27
Security
This Access Point provides complete wireless LAN security functions, included
are WEP, IEEE 802.11x, IEEE 802.11x with WEP, WPA with pre-shared key
and WPA with RADIUS. With these security functions, you can prevent your
wireless LAN from illegal access. Please make sure your wireless stations use
the same security function, and are setup with the same security key.
Disable
When you choose to disable encryption, it is very insecure to operate WL-
303/WL-312.
Enable 802.1x Auth
IEEE 802.1x is an authentication protocol. Every user must use a valid
account to login to this Access Point before accessing the wireless LAN. The
authentication is processed by a RADIUS server. This mode only authenticates
users by IEEE 802.1x, but it does not encrypt the data during communication
Page 28 / 59
28
WEP
When you select 64-bit or 128-bit WEP key, you have to enter WEP keys to
encrypt data. You can generate the key by yourself and enter it. You can
enter four WEP keys and select one of them as a default key. Then the router
can receive any packets encrypted by one of the four keys.
Key Length
You can select the WEP key length for encryption, 64-bit or 128-
bit. The larger the key will be the higher level of security is used, but the
throughput will be lower.
Key Format
You may select ASCII Characters (alphanumeric format) or
Hexadecimal Digits (in the "A-F", "a-f" and "0-9" range) to be the WEP Key.
Key1 - Key4
The WEP keys are used to encrypt data transmitted in the
wireless network. Use the following rules to setup a WEP key on the device.
64-bit WEP: input 10-digits Hex values (in the "A-F", "a-f" and "0-9" range) or
5-digit ASCII character as the encryption keys. 128-bit WEP: input 26-digit
Hex values (in the "A-F", "a-f" and "0-9" range) or 13-digit ASCII characters
as the encryption keys.
Click <Apply> at the bottom of the screen to save the above configurations.
You can now configure other sections by choosing Continue, or choose Apply
to apply the settings and reboot the device.
Page 29 / 59
29
WPA Pre-shared Key
Wi-Fi Protected Access (WPA) is an advanced security standard. You can use
a pre-shared key to authenticate wireless stations and encrypt data during
communication. It uses TKIP or CCMP (AES) to change the encryption key
frequently. So the encryption key is not easy to be cracked by hackers. This is
the best security available.
WPA-Radius
Wi-Fi Protected Access (
WPA
) is an advanced security standard. You can use
an external RADIUS server to authenticate wireless stations and provide the
session key to encrypt data during communication. It uses
TKIP
or CCMP
(
AES
) to change the encryption key frequently. Press
Apply
button when you
are done.
Page 30 / 59
30
ACL
This wireless router supports MAC Address Control, which prevents
unauthorized clients from accessing your wireless network.
Enable wireless access control
Enables the wireless access control function
Adding an address into the list
Enter the "MAC Address" and "Comment"
of the wireless station to be added and then click "Add". The wireless station
will now be added into the "Current Access Control List" below. If you are
having any difficulties filling in the fields, just click "Clear" and both "MAC
Address" and "Comment" fields will be cleared.
Remove an address from the list
If you want to remove a MAC address
from the "Current Access Control List ", select the MAC address that you want
to remove in the list and then click "Delete Selected". If you want to remove
all the MAC addresses from the list, just click the "Delete All" button. Click
"Reset" will clear your current selections.
Click <Apply> at the bottom of the screen to save the above configurations.
You can now configure other sections by choosing Continue, or choose Apply
to apply the settings and reboot the device.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top