
© Copyright 2013 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
TV-IP862IC
40
After the camera has restarted, the wireless configuration options become available.
1.
Check the
Wireless
checkbox. The camera automatically starts scanning your
wireless area.
2.
Enter a name in the
Network Name
field manually, or select a wireless network
router from the drop-down list under
Site Survey
.
3.
Under
Wireless Mode
select between Infrastructure and
Ad-hoc
mode.
Infrastructure Mode
- An 802.11 networking framework in which devices communicate
with each other by first going through an Access Point (AP). In infrastructure mode,
wireless devices can communicate with each other or can communicate with a wired
network.
Ad-Hoc
- An 802.11 networking framework in which devices or stations communicate
directly with each other, without the use of an access point (AP).
Under
Security Mode
select between
None, WEP, WPA-PSK, and WPA2-PSK
.
None
– means no security
WEP
- a security protocol for wireless local area networks (WLANs) defined in the
802.11b standard. WEP is designed to provide the same level of security as that of a
wired LAN. LANs are inherently more secure than WLANs because LANs are somewhat
protected by the physicalities of their structure, having some or all part of the network
inside a building that can be protected from unauthorized access. WLANs, which are
over radio waves, do not have the same physical structure and therefore are more
vulnerable to tampering. WEP aims to provide security by encrypting data over radio
waves so that it is protected as it is transmitted from one end point to another.
WPA-PSK
- uses a pass-phrase, which is between 8 and 63 characters long. This pass-
phrase is created and entered by the user into any client station’s configuration utility,
as well as into the AP. (A recommendation: do not pick a password already in use within
the network, and do not use a variation of your office address.) Generally, when
creating or setting up a wireless LAN, the first thing to be configured is the AP, which is
then followed by the configuration of client stations. Configuring an AP depends largely
upon the manufacturer’s instructions; client station configuration is where the real
choices about security come into play.
WPA2-PSK
- it is a method of securing your network using WPA2 with the use of the
optional Pre-Shared Key (PSK) authentication, which was designed for home users
without an enterprise authentication server. To encrypt a network with WPA2-PSK you
provide your router not with an encryption key, but rather with a plain-English
passphrase between 8 and 63 characters long.
Depending on what
Security Mode
you are using, enter the
Key
in the key field next to
Key. Click the
Show Hidden Key
if you wish to see what you are typing.
Click
Apply
to continue
.
Summary of Contents for TV-IP862IC
Page 1: ...TRENDnet User s Guide Cover Page ...
Page 78: ......