D-Link DSL-2740B Product Manual - Page 41

Transmission Rate, Hide Wireless, Network, Wireless Security, Advanced Setup - access point mode

Page 41 highlights

Section 7 - Advanced Setup Transmission Rate: Select the transmission rate. It is strongly suggested to select Best (Auto) for best performance Hide Wireless Check this box if you would like to hide any access point for your router, so a station cannot obtain the SSID through passive Network: scanning. Wireless Security This device is equipped with 802.1X and WPA/WPA2 (Wi-Fi Protected Access), the latest security standard. Before selecting Mode: security mode, consider your network size, complexity and existing authentication infrastructure in order to determine which solution is best. D-Link DSL-2740B ADSL2+ Modem with Wireless N 300 Router 41

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97

41
D-Link DSL-2740B ADSL2+ Modem with Wireless N 300 Router
Section 7 - Advanced Setup
Transmission Rate:
Hide Wireless
Network:
Wireless Security
Mode:
Select the transmission rate.
It is strongly suggested to select Best (Auto) for best performance
Check this box if you would like to hide any access point for your router, so a station cannot obtain the SSID through passive
scanning.
This device is equipped with 802.1X and WPA/WPA2 (Wi-Fi Protected Access), the latest security standard. Before selecting
security mode, consider your network size, complexity and existing authentication infrastructure in order to determine
which solution is best.