Page 16 / 22 Scroll up to view Page 11 - 15
Page 14
Wireless Configuration
There are 2 options on the menu for Wireless configuration -
Basic
and
Security
.
Wireless - Basic
The settings on this screen must match the other Wireless stations in order for communication to occur.
Figure 12: Wireless Screen
Configuration
Region or
Domain
Select your region from the drop-down list.
This field displays the region of operation for which the
wireless interface is intended. It may not be legal to operate the
router in a region other than the region shown here. If your
country or region is not listed, please check with your local
government agency for more information on which channels
you are allowed to use, and select a region, which allows those
channels. (The channel list changes according to the selected
region.)
Station name
This is the same as the
Device (Host) Name
on the WAN
screen. On your PC, some Wireless status screens may display
this name as the Access Point in use.
Network Type
Select the correct value for your Wireless LAN.
Infrastructure
mode is used when each Wireless station
connects to the Wireless Access point. This also provides
access to the wired LAN.
SSID
(ESSID)
To communicate, all Wireless stations MUST use the same
SSID/ESSID.
The default value is blank (null).
Note! The SSID is case sensitive.
Channel No.
In Infrastructure mode, this setting has not effect – the Access
Point determines the Channel used.
Link Info
Button
Click this button to open a sub screen displaying link
information.
Wireless Security Screen
There are 4 options for Wireless security:
Downloaded from
www.Manualslib.com
manuals search engine
Page 17 / 22
Page 15
Disabled
- no data encryption is used.
WEP
- data is encrypted using the WEP standard.
WPA-PSK
- data is encrypted using the WPA-PSK standard. This is a later standard than WEP, and provides much better
security than WEP. Use this if possible.
WPA2-PSK
- this is a further development of WPA-PSK, and offers even greater security.
Wireless Security - WEP
If "WEP" is selected, the screen will look like the following example.
Figure 13: WEP Screen
Security
System
WEP
The 802.11b standard. Data is encrypted before transmission, but
the encryption system is not very strong.
Authentication
Select the appropriate value, as used on your Wireless LAN
-
"Open System" or "Shared Key."
Key Size
Select the WEP Encryption level:
64-bit
(sometimes called 40-bit) encryption
128-bit
encryption (sometimes called 104 bit encryption)
This selection also allows you to choose the input type for the
keys - Hex or ASCII.
Keys
Use the radio buttons to select the default key.
Enter the key value(s) you wish to use. Other stations must
have the same key values.
Keys can be entered in Hex or ASCII, according to your
Key
Size
selection. Hex characters are the digits (0 ~ 9) and the
letters A ~ F.
Passphrase
Enter some printable characters in the Passphrase field and click
the "Generate Keys" button to automatically configure the WEP
Key(s). For 64 bit keys, four keys fields will be generated. For
128 bit keys, only the selected WEP key will be generated.
Wireless Security - WPA-PSK
If "WPA-PSK" is selected, the screen will look like the following example.
Downloaded from
www.Manualslib.com
manuals search engine
Page 18 / 22
Page 16
Figure 14: WPA-PSK Screen
Security
System
WPA-PSK
Like WEP, data is encrypted before transmission. WPA is more
secure than WEP, and should be used if possible. WPA-PSK is
the version of WPA, which does NOT require a Radius Server
on your LAN.
Passphrase
Enter the Keyword key value. Data is encrypted using a key
derived from the PSK. Other Wireless Stations must use the
same PSK. The PSK must be from 8 to 63 characters in length.
Encryption
Select the desired option. Other Wireless Stations must use the
same method.
Downloaded from
www.Manualslib.com
manuals search engine
Page 19 / 22
Page 17
Wireless Security - WPA2-PSK
If "WPA2-PSK" is selected, the screen will look like the following example.
Figure 15: WPA2-PSK Screen
Security
System
WPA2-PSK
This is a further development of WPA-PSK, and offers even
greater security.
Passphrase
Enter the Keyword key value. Data is encrypted using a key
derived from the PSK. Other Wireless Stations must use the
same PSK. The PSK must be from 8 to 63 characters in length.
Encryption
Select the desired option. Other Wireless Stations must use the
same method.
Downloaded from
www.Manualslib.com
manuals search engine
Page 20 / 22
Page 18
Other Screens
Server Status
This screen shows server system data and the current settings for all of the other screens. It is read-only; no data can be input on this
screen.
Printer Status
This screen displays the current status of each port. For each port, the following data is listed:
Connected Printer
- the model name of the printer connected to the port, if the printer name is known. (If the printer is not bi-
directional, this information is unavailable.)
Status
- the current status of the printer (On-line, Off-line, Out of paper)
Printing Information
- this will show either
Idle
or
Printing
.
Figure 16: Server Status Screen
Figure 17: Printer Status Screen
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top