Security - Pro-Nets Technology Corporation WR750RL User Manual

802.11n wireless broadband router
Table of Contents

Advertisement

Short Slot:
When short slot is Enable, the wireless device uses the short slot time only when
all clients associated to the 802.11g, 2.4-GHz radio supports short slot time. Short slot time is
an 802.11g-only feature and does not apply to 802.11a radios.
Tx Burst:
Enable the transmitted time slot can increase transmission throughput.
Pkt_Aggregate:
The parameter can be used to increase the delivered bandwidth in
community networks including fixed and mobile stations.
Country Code:
Select your local Country code for pull-down menu. For Safety (FCC or CE
rule) reason, please don't change this default setting.
[Wi-Fi Multimedia]
WMM prioritizes traffic according to four Access Categories (AC) - voice, video, best effort,
and background. However, it does not provide guaranteed throughput. It is suitable for simple
applications that require QoS, such as Voice over IP (VoIP) on Wi-Fi phones.
WMM Capable:
Enable/Disable the Wi-Fi Multimedia (WMM) support.
APSD Capable:
Enable/Disable the APSD support.
WMM Parameters:
Click "WMM Configuration" to setup the WMM function.

3.5.3 Security

This function allows you setup the wireless security. Setup the wireless security and
encryption to prevent from unauthorized access and monitoring.
Security Mode:
This function allows you setup the wireless security. Enable security mode
could prevent any unauthorized access to your wireless network. [Open: If your wireless router
is using "Open" authentication, then the wireless adapter will need to set to the same
authentication type. Shared: Shared key is when both the sender and the recipient share a
secret key. WPA, WPA-PSK, WPA2, WPA2-PSK, WPA-PSK/WPA2-PSK, and WPA1/WPA2:
WPA-PSK offers two encryption methods, TKIP and AES. Select the type of algorithm, TKIP or
AES and then enter a WPA Shared Key of 8~64 characters in the WPA Pre-shared key field.]
Encryption Type:
For Open & Shared authentication mode, the selection of encryption type
31

Advertisement

Table of Contents
loading

Table of Contents