appropriate "Only" mode. If you have some devices that use a different
transmission mode, choose the appropriate "Mixed" mode.
°
Wireless Channel
: Select a channel from the drop-down list. The channels
available are based on the country’s regulation. A wireless network uses
specific channels in the wireless spectrum to handle communication between
clients. Some channels in your area may have interference from other
electronic devices. Choose the clearest channel to help optimize the
performance and coverage of your wireless network.
°
Transmission Rate
: Select a transmission rate from the drop-down list. It is
recommended to use the
Best (automatic)
option.
°
Channel Width
: Select a channel width from the drop-down list.
°
Visibility Status
: Select
Visible
or
Invisible
. This is the SSID broadcast
feature. When this option is set to Visible, your wireless network name is
broadcast to anyone within the range of your signal. If you're not using
encryption then they could connect to your network. When Invisible mode is
enabled, you must enter the Wireless Network Name (SSID) on the client
manually to connect to the network.
Click on the
Apply
button to store these settings.
Wireless Security Mode
To protect your privacy this router supports several types of wireless security:
WEP WPA, WPA2, and WPA-Mixed. WEP is the original wireless encryption
standard. WPA provides a higher level of security. The following section describes
the security configuration in detail.
WEP (Wired Equivalent Privacy)
Select the
WEP
radio button if your wireless network uses WEP encryption. WEP
is an acronym for Wired Equivalent Privacy, and is a security protocol that
provides the same level of security for wireless networks as for a wired network.
WEP is not as secure as WPA encryption. To gain access to a WEP network, you
must know the key. The key is a string of characters that you create. When using
WEP, you must determine the level of encryption. The type of encryption
determines the key length. 128-bit encryption requires a longer key than 64-bit
encryption. Keys are defined by entering in a string in HEX (hexadecimal - using
characters 0-9, A-F) or ASCII (American Standard Code for Information
Interchange - alphanumeric characters) format. ASCII format is provided so you
can enter a string that is easier to remember. The ASCII string is converted to
HEX for use over the network. Four keys can be defined so that you can change
keys easily. A default key is selected for use on the network.