40
Unless one of these encryption modes is selected, wireless transmissions to and from your
wireless network can be easily intercepted and interpreted by unauthorized users.
The security modes are described below:
•
OPEN
: You can authenticate successfully with a SSID, whether it is valid or empty.
•
SHARED
: The WLAN clients who have the same WEP key with wireless gateway can
pass the authentication and access the wireless network.
•
WEPAUTO
: Select WEP security automatically.
•
WPA-PSK
: WPA Pre-Shared Key, Enter the Pre-Shared key as a plain text (ASCII) pass-
phrase of at least 8 characters.
•
WPA2-PSK
: It is the securer version of WPA with implementation of the 802.11i standard.
•
WPA-PSK/WPA2-PSK
: Apply both the WPA-PSK and WPA2-PSK scheme.
If the Authentication type is
OPEN
,
SHARED
,
WEPAUTO
, the bottom part of the configuration
page displays parameters as shown.
Ordinary Operation
Summary of Contents for IX256
Page 1: ...1 ZTE IX256 WiMAX MODEM User Manual ...
Page 16: ...16 Preparation for Configuring MODEM ...
Page 26: ...26 Ordinary Operation ...
Page 33: ...33 Ordinary Operation ...
Page 37: ...37 Ordinary Operation ...
Page 46: ...46 If you select Enable the filter settings will appear Ordinary Operation ...
Page 50: ...50 If you select Enable the Virtual Server Settings will appear Ordinary Operation ...
Page 55: ...55 Ordinary Operation ...