Wlan Security - Alfa Network R36 User Manual

150mbps 802.11n 3g mobile wireless router
Hide thumbs Also See for R36:
Table of Contents

Advertisement

opportunity, it can transmit data for a time up to the TxOpLimit. This data
bursting greatly improves the efficiency for high data-rate traffic. Specify a value
in the range 0-65535 microseconds.
ACM — The admission control mode for the access category. When enabled,
clients are blocked from using the access category. (Default: Disabled)
AckPolicy — By default, all wireless data transmissions require the sender to
wait for an acknowledgement from the receiver. WMM allows the
acknowledgement wait time to be turned off for each Access Category (AC) 0-3.
Although this increases data throughput, it can also result in a high number of
errors when traffic levels are heavy. (Default: Acknowledge)
M
-
U
ULTICAST
TO
NICAST
C
ONVERTER
The Multicast-to-Unicast Converter section on the Wireless Settings
Advanced page allows you to enable multicast traffic conversion.
Converting multicast traffic to unicast before sending to wireless clients allows a
longer DTIM (Data Beacon Rate) interval to be set. A longer DTIM interval
prevents clients in power-save mode having to activate their radios to receive the
multicast data, which saves battery life.
Multicast-to-Unicast — Enables multicast traffic streams to be converted to
unicast traffic before delivery to wireless clients. (Default: Disabled)
WLAN S
ECURITY
The 3G Mobile Wireless Router's wireless interface is configured by default as an ―open
system,‖ which broadcasts a beacon signal including the configured SSID. Wireless clients
with a configured SSID of ―ANY‖ can read the SSID from the beacon, and automatically
set their SSID to allow immediate connection to the wireless network.
To implement wireless network security, you have to employ one or both of the
following functions:
Authentication — It must be verified that clients attempting to connect to the
network are authorized users.
Traffic Encryption — Data passing between the unit and clients must be protected
38

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents