RF Configure Menu
42
Configuring the Wireless Access Point
Data Encryption
Protect wireless packets going through the network. You will need to enter a
key, and other wireless devices (terminal or bridge) must use the same key to
communicate.
Configuring the WDS Settings (Bridge Mode)
The wireless AP can work as a bridge to connect two or more networks that
are separated physically or by protocol. Point-to-point bridging is enabled with
wireless bridge devices working in pairs, while point-to-multipoint bridging
uses one device to centrally connect other devices simultaneously.
Note: This function is only available in 5G radio.
The wireless access points are built through a wireless distribution system
(WDS).
1.
Connect two wireless devices to power.
2.
Connect both devices to the PC using Ethernet cables.
3.
On the main menu on the left, click RF Configure > WDS Settings and select
Card2.
4.
Input the distance between the devices on the wireless range.
Note: For point-to-multi-point bridging, the distance is from the farthest point
to the center.
WAPI-PSK & WAPI
Certificate
WAPI stands for Wireless LAN Authentication and Privacy Infra-
structure, a wireless LAN (WLAN) security protocol and security
mechanism of Chinese mandatory standards in wireless LAN.
WAPI uses certificate authentication mode, and can work only
with the authentication server.
Table 5-9. Network Authentication Methods (Continued)
Item
Description
Table 5-10. Data Encryption Methods
Item
Description
None
Can only be used if the network authentication type is Open Sys-
tem.
64 bits WEP
Standard WEP encryption, using 40/64 bit encryption made up of
10 hex numbers.
128 bits WEP
Standard WEP encryption, using 104/128 bit encryption made up
of 26 hex numbers.
152 bits WEP
Standard WEP encryption, using 104/128 bit encryption made up
of 32 hex numbers. This is a proprietary mode that will only work
with other wireless devices supporting this mode.