1. Home
  2. /
  3. Manuals
  4. /
  5. ZTE
  6. /
  7. MF612
  8. /
  9. 7
Page 31 / 47 Scroll up to view Page 26 - 30
31
Beacon Interval
: The router broadcasts beacon message to
announce that it has buffered frames to deliver. The default value
is 100 (ms).
Beacons are packets sent by an access point to
synchronize a wireless network. Specify a beacon interval value.
is recommended.
Data Beacon Rate(DTIM)
:
A Delivery Traffic Indication
Message(DTIM) informs next clients to listen to broadcast and
multicast messages.
Fragment Threshold
: This value should remain at its default
value of 2346. If you experience a high packet error rate, you
may slightly increase your fragment threshold. Setting the
fragment threshold too low may result in poor performance.
RTS Threshold
: Request To Send(RTS) threshold should be
remained as the value of 2347. If you encounter inconsistent
data flow, only minor modifications are recommended.
TX Power
: Transmit power should be remained as the value of
Page 32 / 47
32
100.
Short Preamble
: The length of CRC block in the frames during
the wireless communication.
Shot Slot
: To indicate that 802.11g is using a shot time slot
because there is no legacy station(802.11b) present.
Tx Burst
: Tx burst allows router to deliver better throughput in
the same period and environment in order to increase speed.
Pkt_Aggregate:
Increase efficiency by aggregating multiple
application packets data into a single transmission frame. In this
way, 802.11n networks can send multiple data packets with the
fixed overhead cost in just a single frame.
IEEE 802.11H Support
: Support IEEE 802.11H or not.
The Wi-Fi multimedia parameters are shown below:
WMM Capable
: When multimedia contents are transferred over
wireless network, this function enhances data transfer
performance.
APSD Capable
:
Automatic Power Save Delivery(APSD),
enable
or disable data flow using APSD during transmitting for power
saving.
Click
Apply
to confirm your configuration.
4. Security
Select
Wi-Fi Setting
Security
, the Security parameters
are shown in
the
following figure:
Page 33 / 47
33
Unless one of these encryption modes is selected, wireless
transmissions to and from your wireless network can be easily
intercepted and interpreted by unauthorized users.
The security modes are described below:
Open
: You can authenticate successfully with a SSID, whether it is
valid or empty.
Shared
: The WLAN clients who have the same WEP key with
wireless gateway can pass the authentication and access the
wireless network.
WEPAUTO
: Select WEP security automatically.
WPA-PSK
:
WPA Pre-Shared Key, Enter the Pre-Shared key as a
plain text (ASCII) pass-phrase of at least 8 characters.
WPA2-PSK
:
I
t is the securer version of WPA with implementation
of the 802.11i standard.
WPA-PSK/WPA2-PSK
:Apply both the WPA-PSK and WPA2-PSK
scheme.
If the Authentication type is
Open
,
Shared
,
WEPAUTO,
the bottom
part of the configuration page displays parameters as shown.
WEP Keys
:
At most four keys can be set in the blank. Choose the
primary key index. The primary key is the only key in use at a
given time. Whatever keys you enter for an access point, you
must also enter the same keys for the client adapter in the same
order. In other words, WEP key 1 on the AP must match WEP
key 1 on the client adapter, WEP key 2 on the AP must match
Page 34 / 47
34
WEP key 2 on the client adapter, etc. A WEP is either 10 or 26
hexadecimal digits (0~9,a~f and A~F)based on whether you
select 64 bits 128 bits
in the
Encryption Strength drop-down list.
If the Authentication type is
WPA-PSK
,
WPA2-PSK
or
WPA-
PSK/WPA2-PSK
, the bottom part of the configuration page displays
WPA parameters.
WPA Algorithm
:
TKIP
,
AES
or
AUTO
.
Pass phrase
: You can input hexadecimal digits up to 64
characters or input ASCII characters choose a length of 63
characters or less.
Key Renewal Interval
: Define how long the key should be renew.
You can set
Wireless MAC Filtering
:
Wireless Disable
: If disabled, MAC address is not used to
control network access.
Wireless Allow
: Set the MAC address that is allowed to access
network.
Wireless Reject
: Set the MAC address that is not allowed to
access network.
Click
Apply
to confirm your configuration.
5. WPS
Select
Wi-Fi Setting
WPS
, the WPS configuration is shown in the
following figure:
Page 35 / 47
35
WPS
: Enable or Disable this function.
Click
Apply
to confirm your configuration.
4.2.7 Firewall
You may setup firewall rules to protect your network from virus, worm
and malicious activity on the Internet.
Note: You can set the maximum 10 filtering items for
MAC/IP/Port
Filtering
and
URL Filtering
.
1. MAC/IP/Port Filtering
Select
Firewall
Mac/Ip/Port Filtering
, the Mac/IP/Port Filtering is
shown in the
following figure:
If you select
Enable
, the filter settings will appear:

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top