User's Manual

11
Security
This function is used to protect wireless communication from
eavesdropping. A secondary function of encryption is to prevent
unauthorized access to a wireless network, and it can be achieved by
using the Encryption function.
Ø Data Encryption:
Select WEP for data encryption or No Encryption.
Ø Auth Algorithm:
Open System Authentication algorithm is mostly used. In Shard Key
Authentication algorithm, you must have security on, the algorithm
should be different, and some steps use packets with encryption by
transferring a challenge text. In order to choose which authentication
algorithm will be used, you must know which one the AP supports
first. Most AP only supports Open System.