Airlink AWLH3025 Manual - Page 22

WEP Wired Equivalent Privacy

Page 22 highlights

WEP Configuration Authentication Encryption 1-4 The authentication type defines ID verification and access privileges of roaming wireless network cards. You may choose from Open System, Shared Key, or Auto Switch. Open System: If your access point/wireless router is using "Open System" authentication, then the wireless adapter will need to be set to the same authentication type. Shared Key: Shared Key is when both the sender and the recipient share a secret key. Auto Switch: Select Auto Switch for the adapter to automatically select the appropriate authentication mode. WEP (Wired Equivalent Privacy) encryption can be used to ensure the security of your wireless network. Select one Key and Key Size then enter the appropriate key value in the Encryption field. Note: You must use the same Key #, Key Size, and Encryption Key on both the host and destination devices in order to establish a connection. KEY1 ~ KEY 4:You can specify up to 4 different - 18 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27

-
18 -
WEP
Configuration
Authentication
The authentication type defines ID verification and
access privileges of roaming wireless network
cards.
You may choose from
Open System
,
Shared Key
,
or
Auto Switch
.
Open System:
If your access point/wireless router
is using "
Open System
" authentication, then the
wireless adapter will need to be set to the same
authentication type.
Shared Key
:
Shared Key
is when both the sender
and the recipient share a secret key.
Auto Switch:
Select
Auto Switch
for the adapter
to
automatically
select
the
appropriate
authentication mode.
Encryption 1-4
WEP (Wired Equivalent Privacy)
encryption can
be used to ensure the security of your wireless
network. Select one
Key
and
Key Size
then enter
the appropriate key value in the
Encryption
field.
Note
:
You must use the same
Key #, Key Size,
and
Encryption Key
on both the host and destination
devices in order to establish a connection.
KEY1 ~ KEY 4
You can specify up to 4 different