Draytek VIGORFLY 200 User Manual page 53

Draytek network router user manual
Hide thumbs Also See for VIGORFLY 200:
Table of Contents

Advertisement

holes everywhere. Wireless LAN enables high mobility so WLAN users can simultaneously
access all LAN facilities just like on a wired LAN as well as Internet access
The Vigor wireless routers are equipped with a wireless LAN interface compliant with the
standard IEEE 802.11n draft 2 protocol. To boost its performance further, the Vigor Router is
also loaded with advanced wireless technology to lift up data rate up to 300 Mbps*. Hence,
you can finally smoothly enjoy stream music and video.
Note:
*
environmental factors, including volume of network traffic, network overhead and
building materials.
In an Infrastructure Mode of wireless network, Vigor wireless router plays a role as an Access
Point (AP) connecting to lots of wireless clients or Stations (STA). All the STAs will share the
same Internet connection via Vigor wireless router. The General Settings will set up the
information of this wireless network, including its SSID as identification, located channel etc.
S
e
c
u
r
i
S
e
c
u
r
i
Real-time Hardware Encryption: Vigor Router is equipped with a hardware AES encryption
engine so it can apply the highest protection to your data without influencing user experience.
Complete Security Standard Selection: To ensure the security and privacy of your wireless
communication, we provide several prevailing standards on market.
WEP (Wired Equivalent Privacy) is a legacy method to encrypt each frame transmitted via
radio using either a 64-bit or 128-bit key. Usually access point will preset a set of four keys
and it will communicate with each station using only one out of the four keys.
WPA (Wi-Fi Protected Access), the most dominating security mechanism in industry, is
separated into two categories: WPA-personal or called WPA Pre-Share Key (WPA/PSK), and
WPA-Enterprise or called WPA/802.1x.
VigorFly 200 Series User's Guide
The actual data throughput will vary according to the network conditions and
t
y
O
v
e
r
v
i
e
w
t
y
O
v
e
r
v
i
e
w
45

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents