LevelOne WAB-7400 User Manual page 29

Dual radio poe mesh access point
Hide thumbs Also See for WAB-7400:
Table of Contents

Advertisement

in order to combat fading and interference. Click on "Diversity" drop down
button to select "Card Default", "Enable" or "Disable".
 Tx Antenna: Click on "Tx antenna" drop down button to select "Diversity",
"Card Default", "Port 1", or "Port 2".
 Rx antenna: Click on "Rx antenna" drop down button to select "Diversity",
"Card Default", "Port 1", or "Port 2"
 Base Datarate max Tx power: Default output power of the device.
 Current Datarate max Tx power: You may control the output power of the
device by selecting a value from the drop-down list.
 Security: You may select WEP or WPA security. WEP is an acronym for
Wired Equivalent Privacy, and is a security protocol that provides the same
level of security for wireless networks as for a wired network. WEP is not as
secure as WPA encryption. To gain access to a WEP network, you must know
the key. The key is a string of characters that you create. When using WEP,
you must determine the level of encryption. The type of encryption determines
the key length. 128-bit encryption requires a longer key than 64-bit encryption.
Keys are defined by entering in a string in HEX (hexadecimal - using
characters 0-9, A-F) or ASCII (American Standard Code for Information
Interchange - alphanumeric characters) format. ASCII format is provided so
you can enter a string that is easier to remember. The ASCII string is
converted to HEX for use over the network.
 Encryption Key: Specify the WEP encryption key.
 WPA Security: You may select WEP or WPA security. WPA (Wi-Fi Protected
Access) was designed to improve upon the security features of WEP (Wired
Equivalent Privacy). The technology is designed to work with existing Wi-Fi
products that have been enabled with WEP. WPA provides improved data
encryption through the Temporal Integrity Protocol (TKIP), which scrambles
the keys using a hashing algorithm and by adding an integrity checking feature
which makes sure that keys haven't been tampered with.
 WPA Type: The encryption algorithm used to secure the data communication.
28

Advertisement

Table of Contents
loading

Table of Contents