Channels; Wep; Wpa-Psk - LevelOne WBR-6011 User Manual

N_max wireless router
Hide thumbs Also See for WBR-6011:
Table of Contents

Advertisement

Appendix B - About Wireless LANs

Channels

The Wireless Channel sets the radio frequency used for communication.
Access Points use a fixed Channel. You can select the Channel used. This
allows you to choose a Channel which provides the least interference and best
performance. In the USA and Canada, 11 channels are available. If using mul-
tiple Access Points, it is better if adjacent Access Points use different Channels
to reduce interference.
In "Infrastructure" mode, Wireless Stations normally scan all Channels, looking
for an Access Point. If more than one Access Point can be used, the one with
the strongest signal is used. (This can only happen within an ESS.)
If using "Ad-hoc" mode (no Access Point), all Wireless stations should be set to
use the same Channel. However, most Wireless stations will still scan all
Channels to see if there is an existing "Ad-hoc" group they can join.

WEP

WEP (Wired Equivalent Privacy) is a standard for encrypting data before it is
transmitted.
This is desirable because it is impossible to prevent snoopers from receiving any
data which is transmitted by your Wireless Stations. But if the data is encrypted,
then it is meaningless unless the receiver can decrypt it.
If WEP is used, the Wireless Stations and the Access Point must have the
same settings for each of the following:
WEP
Key
WEP Authentication

WPA-PSK

WPA-PSK is another standard for encrypting data before it is transmitted. This is a
later standard than WEP (Wired Equivalent Privacy), and provides greater security
for your data. Data is encrypted using a 256Bit key which is automatically generated
and changed often.
If all your Wireless stations support WPA-PSK, you should use this instead of WEP.
If WPA-PSK is used, the Wireless Stations and the Access Point must have
the same settings for each of the following:
WPA PSK
(Pre-shared Key)
Encryption
Off, 64 Bit, 128 Bit
For 64 Bit encryption, the Key value must match.
For 128 Bit encryption, the Key value must match
Open System or Shared Key.
Enter the same value on every station and the AP. The
PSK must be from 8 to 63 characters in length. The
256Bit key used for the actual encryption is derived
from this key.
The same encryption method must be used. The most
common encryption method is TKIP. Another widely-
supported method is AES.
107

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents