User's Manual
Table Of Contents
- User’s Guide
- Wireless LAN AP-Router
- Model:
- PW8540IM
- IEEE 802.11b/g
- System Requirement
- Installation Instructions
- Configuring Windows for IP Networking
- Collecting ISP Information
- Setup
- Global Address
- Wireless
- Tools
- Status
- DHCP
- Log
- Statistics
- Printer
- Virtual Servers
- Filters
- IP/URL Block
- Special Apps
- DMZ Host
- MAC Clone
- Dynamic DNS
- Proxy DNS
- SNMP
- Static Routing
- FEDERAL COMMUNICATIONS COMMISSION (FCC) REQUIREMENTS, PART 15
- REGULATORY INFORMATION / DISCLAIMERS
BASIC FUNCTIONS: WIRELESS
FIGURE 3-10: Wireless – Security Settings Page
2. Select one of Open System, Shared Key and Both from the
Authentication Type drop-down list.
Notes
Authentication Type indicates an authentication algorithm
which can be supported by the Access Point:
▪ Open System: The simplest of available authentication
algorithms. Essentially it is a null algorithm. Any station
that requests authentication with this algorithm may
become authenticated if Open System is set at the
recipient station.
▪ Shared Key: Allows stations with a specific WEP (Wired
Equivalent Privacy) Keys to be authenticated.
▪ Both: Supports the authentications of either stations who
know a shared key or those who do not.
3. If you want to prevent other stations without specific WEP (Wired
Equivalent Privacy) keys from linking to the AP, select Enable next
to Encryption and then click Set WEP Keys to specify relevant keys;
otherwise, select Disable. For detailed instructions on how to set the
WEP Keys, see below To Set WEP Keys
.
4. If you want to allow access to the Internet based on user’s MAC
(Media Access Control) address, select On next to Wireless Access
Control and then click Set Access List to specify relevant MAC
addresses; otherwise, click Off. For detailed instructions on how to
specify relevant MAC addresses, see below To Set Wireless Access
Control.
Page 23 of 77