Wireless lan, Wireless lan -28, Security – Toshiba Satellite Pro M40 User Manual

Page 94

Advertising
background image

4-28

User’s Manual

Operating Basics

Wireless LAN

The Wireless LAN is compatible with other LAN systems based on Direct

Sequence Spread Spectrum/Orthogonal Frequency Division Multiplexing

radio technology that complies with IEEE802.11 wireless LAN standard

(Revision A, B or G) and Turbo Mode.
Supported features. It supports the following features:

Automatic Transmit Rate Select mechanism in the transmit range of

54, 48, 36, 24, 18, 12, 9 and 6 Mbit/s (Revision A and G, Revision A/B,

B/G, A/B/G combo type).

Automatic Transmit Rate Select mechanism in the transmit range of 11,

5.5, 2 and 1 Mbit/s (Revision B).

Automatic Transmit Rate Select mechanism in the transmit range of

108, 96, 72, 48, 36, 24, 18 and 12 Mbit/s (Turbo mode, Revision A/B/G

combo type).

Frequency Channel Selection (Revision A/Turbo Mode: 5 GHz,

Revision B/G: 2.4GHz)

Roaming over multiple channels

Card Power Management

Atheros Super G™ or Super AG™ technology (Atheros module type).

Wired Equivalent Privacy (WEP) data encryption, based on the

152 bit encryption algorithm (Atheros module type).

Wired Equivalent Privacy (WEP) data encryption, based on the

128 bit encryption algorithm (Atheros module type).

Advanced Encryption Standard (AES) data encryption, based on

256 bit encryption algorithm (Atheros module type).

Security

Be sure to enable WEP (encryption) function. Otherwise your computer

will allow the illegal access by outsider through wireless LAN to cause

illegal instruction, eavesdropping, and loss or destruction of stored data.

TOSHIBA strongly recommends the customer to enable the WEP

function.

TOSHIBA is not liable for the eavesdropping of data due to the use of

Wireless LAN and the damage thereof.

Radio links

You can easily establish links between two or more devices. The link is

maintained even if the devices are not within line of sight.

Security

Two advanced security mechanisms ensure a high level of security:

Authentication prevents access to critical data and makes it impossible

to falsify the origin of a message.

Encryption prevents eavesdropping and maintains link privacy.

Advertising
This manual is related to the following products: