1 wireless security mode, 1 wep (wired equivalent privacy) – EnGenius Technologies ESR-9710 User Manual

Page 36

Advertising
background image

ESR-9710 Wireless N Gigabit Router

Version 1.0

36

ƒ Transmission Rate: Select a transmission rate from the drop-down list. It is

recommended to use the Best (automatic) option.

ƒ Channel Width: Select a channel width from the drop-down list.
ƒ Visibility Status: Select Visible or Invisible. This is the SSID broadcast feature.

When this option is set to Visible, your wireless network name is broadcast to
anyone within the range of your signal

. If you're not using encryption then they

could connect to your network. When Invisible mode is enabled, you must enter the
Wireless Network Name (SSID) on the client manually to connect to the network.

ƒ Show Active Clients: Click on this button to view a list of clients that are associated

with this device.

ƒ Click on the Save Changes button to store these settings.

6.2.3.1 Wireless

Security

Mode

ƒ To protect your privacy this mode supports several types of wireless security: WEP

WPA, WPA2, and WPA-Mixed. WEP is the original wireless encryption standard.
WPA provides a higher level of security. The following section describes the security
configuration in detail.


6.2.3.1.1

WEP (Wired Equivalent Privacy)

ƒ Select

the

WEP radio button if your wireless network uses WEP encryption. WEP is

an acronym for Wired Equivalent Privacy, and is a security protocol that provides the
same level of security for wireless networks as for a wired network.

ƒ WEP is not as secure as WPA encryption. To gain access to a WEP network, you

must know the key. The key is a string of characters that you create. When using
WEP, you must determine the level of encryption. The type of encryption determines
the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys
are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F)
or ASCII (American Standard Code for Information Interchange - alphanumeric
characters) format. ASCII format is provided so you can enter a string that is easier
to remember. The ASCII string is converted to HEX for use over the network. Four
keys can be defined so that you can change keys easily. A default key is selected for
use on the network.







Advertising