54
network name. Add up to three additional SSIDs to create virtual wireless networks from one
wireless Router Access Point device.
Add Additional Wireless Network Name (SSID)
To add additional wireless Network Names simply add the name to the Multiple SSID field and
click on apply at the bottom of the page. When finished, go to the Security section in this Users
Guide for wireless security configuration.
Security Mode
Unless one of these encryption modes is selected, wireless transmissions to and from your
wireless network can be easily intercepted and interpreted by unauthorized users.
WPA-
Both of these options select some variant of Wi-Fi Protected Access (WPA) -- security
standards published by the Wi-Fi Alliance. The WPA Mode further refines the variant that the
router should employ.
WPA Mode: WPA is the older standard; select this option if the clients that will be used with the
router only support the older standard. WPA2 is the newer implementation of the stronger IEEE
802.11i security standard. With the "WPA2" option, the router tries WPA2 first, but falls back to
WPA if the client only supports WPA. With the "WPA2 Only" option, the router associates only
with clients that also support WPA2 security.
Cipher Type: The encryption algorithm used to secure the data communication. TKIP (Temporal
Key Integrity Protocol) provides per-packet key generation and is based on WEP. AES
(Advanced Encryption Standard) is a very secure block based encryption. With the "TKIP and
AES" option, the router negotiates the cipher type with the client, and uses AES when available.
Group Key Update Interval:
The amount of time before the group key used for broadcast and
multicast data is changed.
WPA-PSK
This option uses Wi-Fi Protected Access with a Pre-Shared Key (PSK).
Pre-Shared Key: The key is entered as a pass-phrase of up to 63 alphanumeric characters in ASCII
(American Standard Code for Information Interchange) format at both ends of the wireless connection.
It cannot be shorter than eight characters, although for proper security it needs to be of ample length
and should not be a commonly known phrase. This phrase is used to generate session keys that are
unique for each wireless client.
Summary of Contents for TEW-812DRU
Page 1: ...802 11ac draft 2 0 TEW 812DRU Gigabit Wireless Router TEW 812DRU Rev 0 1 User Manual ...
Page 11: ...10 ...
Page 19: ...18 ...
Page 20: ...19 Guest Network This page allows you to configure the Guest Network ...
Page 22: ...21 ...
Page 24: ...23 ...
Page 25: ...24 The device status Management ...
Page 30: ...29 This restarts the router It is useful for restarting when you are not near the device ...
Page 34: ...33 Router Status ...
Page 35: ...34 The device status ...
Page 36: ...35 IPv6 Status ...
Page 37: ...36 System log This page can be used to set remote log server and show the system log ...
Page 39: ...38 Setup LAN Setting ...
Page 48: ...47 QoS ...
Page 52: ...51 Then press Apply ...
Page 53: ...52 ...
Page 71: ...70 FTP Server Enable the FTP server to share the files on USB storage ...
Page 72: ...71 Eject Device ...