4. Web Configuration
33
HEX Format
ASCII Format
64 Bit
10 hexadecimal digits
5 ASCII characters
128 Bit
26 hexadecimal digits
13 ASCII characters
Specifing a default key to encrypt outging data
Aside from entering your WEP keys, you should select one of the
entered keys to encrypt the data before being transmitted. The AP
always transmits data encrypted using this WEP Key. The key
number (1,2,3,4) is also transmitted. The receiving station will use
the key number to determine which key to use for decryption. If the
key value does not match with the transmitting station, the
decryption will fail. To ensure successful decryption, have your
wireless stations set identical key tables.
Note:
All Wireless Stations must use identical encryption algorithm
level and Key values (same key position in its key table) to ensure
successful data transmission.
X
Access Control
MAC Address Access Control:
This AP has the capability to
control the wireless client access based on the MAC address of a
wireless client. We offer you the flexibility to customize your own
control policy based on these options:
•
Allow:
If selected, only the wireless client whose MAC
address is in the
Allow List
is allowed to access this AP.
•
Deny:
If selected, only the wireless client whose MAC
address is in the list cannot access this AP. Others clients
are granted access.
•
Disable:
No access control. All the clients are allowed to
access this AP.
When entering MAC address in the list, up to 16 MAC entries are
allowed.
Содержание F5D7230-4
Страница 1: ...Wireless Broadband Router User Manual ...
Страница 12: ......
Страница 16: ...Wireless Broadband Router User Manual 8 The figure below illustrates a connection diagram example ...
Страница 24: ......
Страница 38: ...Wireless Broadband Router User Manual 30 Figure 4 12 Bridge Mode Manual Config ...
Страница 54: ...Wireless Broadband Router User Manual 46 Figure 4 16 Administration ...