300M MIMO Wireless-N Router
(iB-WRB300N)
● Key Renewal Interval: Enter a valid time period for the key.
5.2.3 WPA2-PSK
The later WPA2 protocol features compliance with the full IEEE 802.11i standard and uses
Advanced Encryption Standard (AES) in addition to TKIP encryption protocol to guarantee better
security than that provided by WEP or WPA.
5.2.4 WEP
WEP is intended to provide data confidentiality comparable to that of a traditional wired network.
Two methods of authentication can be used with WEP: Open System authentication and Shared
Key authentication.
● WEP Key: You can select either ASCII or Hexadecimal from the drop-down menu.
Note: If you select ASCII, enter 5 or 13 valid ASCII characters; or if you select Hexadecimal,
enter 10 or 26 Hexadecimal characters.
● Default Key: Select one key from the 4 preset keys.
5.3 Access Control
The Access Control feature can be used to allow or disallow clients to connect to your wireless
network.
23