Edimax EW-7711In Manual - Page 68

Use Mac Address

Page 68 highlights

Here are descriptions of every setup item: Item Name SSID Channel Wireless Mode Use Mac Address Security Setting Description Please input the SSID (the name used to identify this wireless access point) here. Up to 32 numerical characters can be accepted here, excepting space. Please select the wireless channel you wish to use. The number of channels available here will vary depends on the setting of 'Country Region Code'. Select the operation mode of the access point here. Click this button to use the MAC address of the wireless card as SSID. A prefix 'AP' will be added automatically. Set the security options (wireless data encryption). Please refer to chapter 3-2 'Security Settings' for details. 61

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88

61
Here are descriptions of every setup item:
Item Name
Description
SSID
Please input the SSID (the name used to identify
this wireless access point) here. Up to 32
numerical characters can be accepted here,
excepting space.
Channel
Please select the wireless channel you wish to use.
The number of channels available here will vary
depends on the setting of ‘Country Region Code’.
Wireless Mode
Select the operation mode of the access point here.
Use Mac Address
Click this button to use the MAC address of the
wireless card as SSID. A prefix ‘AP’ will be added
automatically.
Security Setting
Set the security options (wireless data encryption).
Please refer to chapter 3-2 ‘Security Settings’ for
details.