User's Manual
FEB/25th/2002
7
3.2.4 Wireless Security
To protect your wireless intellectual property, it is important to secure your wireless
connection. This Access Point is equipped a sophisticated security algorithm to protect
against intruders entering your system or listening to the conversation over your network.
3.2.4.1 ACL
You can assign different access rules for different users by adding the MAC address and
the access rights which is to either accept or reject the connection.
3.2.4.2 WEP
The basic security settings is to enable WEP algorithm by assigning 64 or 128 bits
encryption key. You have to enter a specific length of hexadecimal key in the appropriate
field:
Example 64 bits: ABCDEA01234567899876543210 26 digits
Example 128 bits: ABCDA012345 10 digits