User guide

Page 41
Configuration
Regulatory
Domain
It is illegal to use this device in any location outside of the regulatory
domain.
Station name This is the same as the Device (Host) Name on the WAN screen. On
your PC, some Wireless status screens may display this name as the
Access Point in use.
SSID
(ESSID)
To communicate, all Wireless stations MUST use the same
SSID/ESSID.
The default value is null.
Note! The SSID is case sensitive.
Channel No. The default Channel for the USA and Canada is 3.
Select the value you wish to use on your Wireless LAN. If you
experience lost connections and/or slow data transfers you may need to
experiment with different channels to see which is the best.
Network Type Select the correct value for your Wireless LAN.
802.11 Ad-hoc mode is used when there is no Wireless Access
Point, and each Wireless station communicates directly with other
Wireless stations. This is the current standard.
Ad-hoc mode is used when there is no Wireless Access Point, and
each Wireless station communicates directly with other Wireless
stations. This is the older standard.
Infrastructure mode is used when each Wireless station connects to
the Wireless Access point. This also provides access to the wired
LAN.
Link Info
Button
Click this button will open the sub screen.
WEP Data Privacy
Off If OFF (default), data is NOT encrypted before being transmitted.
64 Bit
Encryption
If selected, data is encrypted, using the default key, before being
transmitted.
The receiving station must be set to 64 Bit Encryption, and have the
same Key value in the same position in its key table. Otherwise, it will
not be able to decrypt the data.
Default Key
Select the key you wish to be the default. Transmitted data is ALWAYS
encrypted using the Default Key; the other Keys are for decryption only.
Key Table:
This table is used when Encrypting and Decrypting data. All stations,
including this Access Point, always transmit data encrypted using their
default key. The key number (1, 2, 3, 4) is also transmitted. The
receiving station will use the key number (1, 2, 3, 4) to determine which
key value to use for decryption. If the key value does not match the
transmitting station, decryption will fail.
The easiest way to ensure there are no problems is to have every Station,
including the Access Point, use the same key table (all entries identical).
Then, it does not matter which key is used as the default key.