User guide

Settings 81
Settings
Security Panel
1. Log in to the home page.
2. Click Advanced Settings ( ).
3. Click Wi-Fi > Security.
From this window, you can set the:
Security This specifies the security used by Wi-Fi. (See Wi-Fi Security” on page 85.)
Wi-Fi Password This password is used to connect to the Wi-Fi network. (See “Wi-Fi
Password” on page 86.)
Password Reminder This feature displays the Wi-Fi password on the LCD of the device. (See
Wi-Fi Password Reminder” on page 86.)
Basic Rate This setting determines the type of wireless devices that can connect to your
network.
If you’re certain that all of the Wi-Fi devices used with your device support 802.11g, then
select
802.11g only (this ensures faster Wi-Fi speeds); otherwise, select 802.11b/g/n
compatibility or 802.11b/g compatibility.
If you change this value to 802.11b/g/n compatibility and the specified Wi-Fi security type is
not supported by this value, the security type may change to WPA/WPA2 Personal.
MAC Filter Panel
The MAC (Media Access Control) filter is used to grant (“whitelist”) or block (“blacklist”) wireless
devices access to the Wi-Fi, 3G, and 4G networks. Access is based on the MAC address of each
wireless device.
MAC filtering can prevent unauthorized wireless devices from connecting to your network.
MAC filtering increases security of your network. You can give access to your network, based on
the MAC address of the wireless devices. This makes it harder for a hacker to use a MAC address
to access your network.
To access this panel:
1. Log in to the home page.
2. Click Advanced Settings ( ).
3. Click Wi-Fi > MAC Filter.
From this window, you can:
Turn off MAC filtering (MAC Filter Mode = “No filtering”)
Display a list of computers that are:
Allowed to access the network (MAC Filter Mode = “Allow all in list”)
Not allowed to access the network (MAC Filter Mode = “Block all in list”)
Add or remove a computer from the lists. (See “Specifying Computers That Can Access the
Network” on page 87 and “Specifying Computers That Are Not Allowed to Access the Network”
on page 88.)