Operation As An Ap Bridge Wds; Setting The Encryption For Ap - Hama MiMo 300 Express Mode D'emploi

Masquer les pouces Voir aussi pour MiMo 300 Express:
Table des Matières

Publicité

Les langues disponibles

Les langues disponibles

3.2.1.4 Operation as an AP Bridge WDS

What is WDS? Wireless Distribution System is the name for wireless connections between multiple access
points, and also allows clients to log-in, which is not permitted by other bridge modes. The bandwidth of the
network is halved for each additional access point as the packets have to be sent twice.
This makes it a combination of the
previous modes.
Selecting this under Band allows you to
specify whether the device runs ion the
2.4 Ghz band in accordance with the 802.11b
(11Mbps), 802.11g (54Mbps) standards or
works in combination with 802.11b and
802.11g. The ESSID is required for the client
network. It acts as identification in the
network and must therefore be identical for
all users in the client network. The ESSID
can be up to 32 characters long.
Channel Number allows you to select the channel in which the data is to be transferred. 13 channels are
available. Enter the addresses of the access points to which the bridge connection is to be made in MAC
address 1 to MAC address 6. To set the encryption for your wireless network, click the Set Security button.
Continue reading on page 11 for instructions on setting Wireless LAN encryption.
Click Apply in the next window, and again in the window after that if you want to operate a wireless network
without encryption. The router is then restarted. The wireless network is available after you restart.

3.2.2 Setting the Encryption for AP

First, it is important to understand a range of terms. The next section will explain the main terms used here:
Authentication: Authentication is a process in which the identity, e.g. of a person is determined based on a
certain characteristic. This can be done by fingerprint, password or any other proof of authorisation.
Encryption: Encryption is a process in which plain text is transformed into a coded text via an encryption
process (algorithm). One or more codes can be used for this. It must also be mentioned that each individual
encryption process offers one or more authentication options.
The following encryption types are available for this mode:
64 Bit and 128 Bit WEP encryption
WPA and WPA2 encryption
9

Publicité

Table des Matières
loading

Ce manuel est également adapté pour:

00062735

Table des Matières