TRENDnet TEW-630APB User Manual page 19

300mbps wireless n access point
Hide thumbs Also See for TEW-630APB:
Table of Contents

Advertisement

A wireless network uses specific channels in the wireless spectrum to handle communication
between clients. Some channels in your area may have interference from other electronic
devices. Choose the clearest channel to help optimize the performance and coverage of your
wireless network.
802.11 Mode
If all of the wireless devices you want to connect with this Access Point can connect in the
same transmission mode, you can improve performance slightly by choosing the appropriate
"Only" mode. If you have some devices that use a different transmission mode, choose the
appropriate "Mixed" mode.
Channel Width
The "Auto 20/40 MHz" option is usually best. The other options are available for special
circumstances.
Transmission Rate
By default the fastest possible transmission rate will be selected. You have the option of
selecting the speed if necessary.
Visibility Status
The Invisible option allows you to hide your wireless network. When this option is set to
Visible, your wireless network name is broadcast to anyone within the range of your signal. If
encryption is not being used, clients can connect to your network. When Invisible mode is
enabled, you must enter the Wireless Network Name (SSID) on the client manually to
connect to the network.
Security Mode
Unless one of these encryption modes is selected, wireless transmissions to and from your
wireless network can be easily intercepted and interpreted by unauthorized users.
WEP
A method of encrypting data for wireless communication intended to provide the same level
of privacy as a wired network. WEP is not as secure as WPA encryption. To gain access to a
WEP network, you must know the key. The key is a string of characters that you create.
When using WEP, you must determine the level of encryption. The type of encryption
determines the key length. 128-bit encryption requires a longer key than 64-bit encryption.
Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or
ASCII (American Standard Code for Information Interchange - alphanumeric characters)
format. ASCII format is provided so you can enter a string that is easier to remember. The
ASCII string is converted to HEX for use over the network. Four keys can be defined so that
you can change keys easily. A default key is selected for use on the network.
Example:
64-bit hexadecimal keys are exactly 10 characters in length. (12345678FA is a valid string of
10 characters for 64-bit encryption.)
Page 19

Advertisement

Table of Contents
loading

Table of Contents