TRENDnet TEW1750ACV2 User Manual page 34

Table of Contents

Advertisement

network name. Add up to three additional SSIDs to create virtual wireless networks from one
wireless Access Point Access Point device.
Add Additional Wireless Network Name (SSID)
To add additional wireless Network Names simply add the name to the Multiple SSID field and
click on apply at the bottom of the page. When finished, go to the Security section in this Users
Guide for wireless security configuration.
Security Mode
Unless one of these encryption modes is selected, wireless transmissions to and from your
wireless network can be easily intercepted and interpreted by unauthorized users.
WPA-
Both of these options select some variant of Wi-Fi Protected Access (WPA) -- security
standards published by the Wi-Fi Alliance. The WPA Mode further refines the variant that the
Access Point should employ.
WPA Mode: WPA is the older standard; select this option if the clients that will be used with the
Access Point only support the older standard. WPA2 is the newer implementation of the
stronger IEEE 802.11i security standard. With the "WPA2" option, the Access Point tries WPA2
first, but falls back to WPA if the client only supports WPA. With the "WPA2 Only" option, the
Access Point associates only with clients that also support WPA2 security.
Cipher Type: The encryption algorithm used to secure the data communication. TKIP (Temporal
Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES
(Advanced Encryption Standard) is a very secure block based encryption. With the "TKIP and
AES" option, the Access Point negotiates the cipher type with the client, and uses AES when
available.
Group Key Update Interval: The amount of time before the group key used for broadcast and
multicast data is changed.
WPA-PSK
This option uses Wi-Fi Protected Access with a Pre-Shared Key (PSK).
Pre-Shared Key: The key is entered as a pass-phrase of up to 63 alphanumeric characters in ASCII
(American Standard Code for Information Interchange) format at both ends of the wireless connection.
It cannot be shorter than eight characters, although for proper security it needs to be of ample length
and should not be a commonly known phrase. This phrase is used to generate session keys that are
unique for each wireless client.
33

Advertisement

Table of Contents
loading

This manual is also suitable for:

Tew-815dap

Table of Contents