Wireless Networking And Security; How To Choose The Type Of Security For Your Wireless Network - TRENDnet TEW-755AP User Manual

Hide thumbs Also See for TEW-755AP:
Table of Contents

Advertisement

TRENDnet User's Guide
5. Click on Device settings to configure the access point.
 Product Name: Displays the device model
 IP Mode: Select the IP mode to apply on the device
o DHCP: Select this option to allow the device to receive IP address from your
DHCP server
o Static: Select this option to manually set the IP address of the device
 IP Address: Enter the IP address to assign to the device
 Subnet Mask: Enter the subnet mask to assign to the device
© Copyright 2015 TRENDnet. All Rights Reserved.
 Gateway: Enter the gateway IP address to assign to the device
 System Name: Assign name of the device to help distinguish between similar
devices
 Band: Select on the pull down menu the wireless interface to configure
 Enable: Select this option to enable the selected wireless interface
 Visible: Select this option to wireless broadcast the selected wireless interface
 SSID: Enter the SSID (Wireless Network Name) of the selected wireless interface
 Security: Select the wireless encryption security for to assign the selected
wireless interface
 Key: Enter the wireless encryption security key or password
 Channel: Select the wireless channel of the selected wireless interface
 802.11 Mode: Select the 802.11 mode of the selected wireless interface
 Password: Enter the login password of the device and click OK to save settings.

Wireless Networking and Security

How to choose the type of security for your wireless network

Setting up wireless security is very important. Leaving your wireless network open and
unsecure could expose your entire network and personal files to outsiders. TRENDnet
recommends reading through this entire section and setting up wireless security on your
new router.
There are a few different wireless security types supported in wireless networking each
having its own characteristics which may be more suitable for your wireless network
taking into consideration compatibility, performance, as well as the security strength
along with using older wireless networking hardware (also called legacy hardware).
It is strongly recommended to enable wireless security to prevent unwanted users from
accessing your network and network resources (personal documents, media, etc.).
In general, it is recommended that you choose the security type with the highest
strength and performance supported by the wireless computers and devices in your
network. Please review the security types to determine which one you should use for
your network.
TEW-755AP
11

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents