Netgear WPN824EXT WPN824EXT User Manual - Page 45

Advanced Settings and Features, Advanced Wireless Settings, Wireless Repeating Function

Page 45 highlights

Chapter 4 Advanced Settings and Features This chapter describes the features you can configure or view under Advanced in the main menu of your WiFi range extender. Advanced Wireless Settings Note: The Advanced Wireless Settings options are described in the context of configuring wireless security. See Chapter 2, "Implementing Appropriate Wireless Security." Wireless Repeating Function The WiFi range extender can be used with wireless access points (APs) to build large bridged wireless networks, using the Wireless Repeating Function screen. Warning: If you use the Wireless Repeating function, be aware that this limits your options for wireless security to none or WEP. For more information about wireless security, see Chapter 2, "Implementing Appropriate Wireless Security." 4-1 v1.0, April 2008

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64

4-1
v1.0, April 2008
Chapter 4
Advanced Settings and Features
This chapter describes the features you can configure or view under Advanced in the main menu of
your WiFi range extender.
Advanced Wireless Settings
Wireless Repeating Function
The WiFi range extender can be used with wireless access points (APs) to build large bridged
wireless networks, using the Wireless Repeating Function screen.
Note:
The Advanced Wireless Settings options are described in the context of configuring
wireless security. See
Chapter 2, “Implementing Appropriate Wireless Security.”
Warning:
If you use the Wireless Repeating function, be aware that this limits your
options for wireless security to none or WEP. For more information about
wireless security, see
Chapter 2, “Implementing Appropriate Wireless
Security.”