background image

 

10 

4.2 Modifying Security Settings 

 

1.

 

Use the remote control that came with your Blueray player to access the network 

configuration settings page.     

2.

 

Select a security option of this wireless network. This product provides security options below. 

Contact your wireless network administrator for choosing a correct option.   

 

WPA/WPA2/CCKM   

 

WPA/WPA2 Passphrase   

 

802.1x   

 

Pre-Shared Key (Static WEP)   

 

None   

WPA/WPA2

 

Enables the use of Wi-Fi Protected Access (WPA).    
Choosing WPA/WPA2 opens the WPA/WPA2 EAP drop-down menu. 
The options include: 

 

EAP-FAST 

 

EAP-TLS   

 

EAP-TTLS   

 

EAP-SIM   

 

PEAP (EAP-GTC)   

 

PEAP (EAP-MSCHAP V2)   

 

LEAP   

WPA/WPA2 
Passphrase

 

Enables WPA/WPA2 Passphrase security.     
Click on the Configure button and fill in the WPA/WPA2 Passphrase.   
 

802.1x

 

Enables 802.1x security.   This option requires IT administration.   
Choosing 802.1x opens the 802.1x EAP type drop-down menu.   The 
options include:   
 

 

EAP-FAST   

 

EAP-TLS   

 

EAP-TTLS   

 

EAP-SIM   

 

PEAP (EAP-GTC)   

 

PEAP (EAP-MSCHAP V2)   

 

LEAP   

 

Pre-Shared Key 
(Static WEP)

 

Enables the use of pre-shared keys that are defined on both the access 
point and the station.   
To define pre-shared encryption keys, choose the Pre-Shared Key radio 
button and click the Configure button to fill in the 

Define Pre-Shared 

Keys window.

   

 
 

Summary of Contents for DNUR-W1

Page 1: ...802 11 b g n USB Module DNUR W1 User Manual February 2013...

Page 2: ...ay be reproduced stored in a retrieval system or transmitted in any form or by any means whether electronic mechanical photocopying recording or otherwise without the prior writing of the publisher Pe...

Page 3: ...aration between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV techni...

Page 4: ...an not be met for example certain laptop configurations or co location with another transmitter then the FCC authorization is no longer considered valid and the FCC ID can not be used on the final pro...

Page 5: ...for OEM integrators under the following conditions 1 The antenna must be installed such that 20 cm is maintained between the antenna and users and 2 The transmitter module may not be co located with...

Page 6: ...grateur OEM sera charg de r valuer le produit final y compris l metteur et l obtention d une autorisation distincte au Canada End Product Labeling This transmitter module is authorized only for use i...

Page 7: ...ir des informations l utilisateur final quant la fa on d installer ou de supprimer ce module RF dans le manuel de l utilisateur du produit final qui int gre ce module Le manuel de l utilisateur final...

Page 8: ...2 DRIVER UTILITY INSTALLATION UNINSTALLATION 8 3 CONNECTING TO AN EXISTING NETWORK 8 4 MODIFYING A WIRELESS NETWORK 9 4 1 MODIFYING GENERAL SETTINGS 9 4 2 MODIFYING SECURITY SETTINGS 10 5 SPECIFICATI...

Page 9: ...sing its network function without installing driver or utility 3 Connecting to an Existing Network 1 Use the remote control that came with your Blueray player to access the network configuration setti...

Page 10: ...y the settings below for your network Profile Name Identifies the configuration wireless network profile This name must be unique Profile names are not case sensitive Client Name Identifies the client...

Page 11: ...e options include EAP FAST EAP TLS EAP TTLS EAP SIM PEAP EAP GTC PEAP EAP MSCHAP V2 LEAP WPA WPA2 Passphrase Enables WPA WPA2 Passphrase security Click on the Configure button and fill in the WPA WPA2...

Page 12: ...ch means no time limit is imposed for finding the domain controller Note The authentication process times out whenever the authentication timer times out or the time for finding the domain controller...

Page 13: ...83GHz Channels support 802 11n b g US Canada 11 1 11 Major European country 13 1 13 France 4 10 13 Japan 11b 14 1 13 or 14th 11g 13 1 13 China 13 1 13 Operation temperature Host interface USB 2 0 Oper...

Page 14: ...ed receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or c...

Page 15: ...ogy that links access points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and qualit...

Reviews: