Chapter 6 The WIFI Configuration Screen
User’s Guide
60
• Use the General screen (see
) to turn the wireless
connection on or off, set up wireless security, configure the MAC filter, set up
Quality of Service and make other basic configuration changes.
• Use the MAC Filter screen (see
) to configure a MAC
(Media Access Control) address filter to restrict access to the wireless network.
You don’t necessarily need to use all these screens to set up your wireless
connection. For example, you may just want to set up a network name, a wireless
radio channel and some security in the AP screen.
6.1.2 What You Need to Know About WIFI
Wireless Basics
• Every device in the same wireless network must use the same Service Set
IDentity (SSID).
The SSID is the name of the wireless network.
• If two wireless networks overlap, they should use different channels.
Like radio stations or television channels, each wireless network uses a specific
channel, or frequency, to send and receive information.
Wireless Network Construction
Wireless networks consist of wireless clients, access points and bridges.
• A wireless client is a radio connected to a user’s computer.
• An access point is a radio with a wired connection to a network, which can
connect with numerous wireless clients and let them access the network.
• A bridge is a radio that relays communications between access points and
wireless clients, extending a network’s range.
Traditionally, a wireless network operates in one of two ways.
• An “infrastructure” type of network has one or more access points and one or
more wireless clients. The wireless clients connect to the access points.
• An “ad-hoc” type of network is one in which there is no access point. Wireless
clients connect to one another in order to exchange information.
Wired Equivalent Privacy (WEP)
WEP (Wired Equivalent Privacy) encrypts data transmitted between wired and
wireless networks to keep the transmission private. Although one of the original
wireless encryption protocols, WEP is also the weakest. Many people use it strictly
to deter unintentional usage of their wireless network by outsiders.
Authentication Type
Summary of Contents for MAX-207HW2
Page 7: ...Safety Warnings User s Guide 8...
Page 9: ...Contents Overview User s Guide 10...
Page 16: ...17 PART I Introduction and Wizards Getting Started 19 Introducing the Web Configurator 23...
Page 17: ...18...
Page 27: ...Chapter 2 Introducing the Web Configurator User s Guide 28...
Page 28: ...29 PART II Basic Screens The Main Screen 25 The Setup Screens 31...
Page 29: ...30...
Page 37: ...Chapter 3 The Setup Screens User s Guide 38...
Page 39: ...40...
Page 43: ...Chapter 4 The Status Screen User s Guide 44...
Page 57: ...Chapter 5 The LAN Configuration Screens User s Guide 58...
Page 75: ...Chapter 6 The WIFI Configuration Screen User s Guide 76...
Page 87: ...Chapter 7 The WAN Configuration Screens User s Guide 88...
Page 97: ...Chapter 8 The NAT Configuration Screens User s Guide 98...
Page 107: ...108...
Page 125: ...Chapter 10 The Service Configuration Screens User s Guide 126...
Page 141: ...Chapter 12 The Phone Book Screens User s Guide 142...
Page 143: ...144...
Page 147: ...Chapter 13 The Certificates Screens User s Guide 148...
Page 159: ...Chapter 14 The Remote Management Screens User s Guide 160...
Page 165: ...Chapter 16 The Status Screen User s Guide 166...
Page 166: ...167 PART VI Troubleshooting and Specifications Troubleshooting 169 Product Specifications 177...
Page 167: ...168...