8
3.2.1.3 Operation as an AP Bridge Point to Multi-Point
The difference to the AP Bridge Point to Point operation is
that you can enter the MAC addresses of several access
points in this mode. Bridge connections can be establis-
hed to a maximum of 6 other access points. Selecting
this under
Band
allows you to specify whether the device
runs ion the 2.4 Ghz band in accordance with the 802.11b
(11Mbps), 802.11g (54Mbps) standards or works in combi-
nation with 802.11b and 802.11g.
Channel Number
allows
you to select the channel in which the data is to be trans-
ferred. 13 channels are available. Enter the addresses of
the access points to which the bridge connection is to be
made in
MAC address 1 to MAC address 4
.
To set the encryption for your wireless network, click the
Set Security
button.
Continue reading on page 10 for instructions on setting
Wireless LAN encryption.
Click
Apply
in the next window, and again in the window after that if you want to operate a wireless network without encryption. The
router is then restarted. The wireless network is available after you restart.
3.2.1.4 Operation as an AP Bridge WDS
What is
WDS
? Wireless Distribution System is the name for wireless connections between multiple access points, and also allows
clients to log-in, which is not permitted by other bridge modes. The bandwidth of the network is halved for each additional access
point as the packets have to be sent twice.
This makes it a combination of the previous modes.
Selecting this under
Band
allows you to specify whether
the device runs ion the 2.4 Ghz band in accordance with
the 802.11b (11Mbps), 802.11g (54Mbps) standards or
works in combination with 802.11b and 802.11g. The
ESSID
is required for the client network. It acts as identifi cation
in the network and must therefore be identical for all
users in the client network. The
ESSID
can be up to 32
characters long.
Channel Number
allows you to select the channel in
which the data is to be transferred. 13 channels are
available. Enter the addresses of the access points
to which the bridge connection is to be made in
MAC
address 1 to MAC address 4
. To set the encryption for your
wireless network, click the
Set Security
button.
Continue reading on page 10 for instructions on setting
Wireless LAN encryption.
Click
Apply
in the next window, and again in the window after that if you want to operate a wireless network without encryption. The
router is then restarted. The wireless network is available after you restart.
3.2.2 Setting the Encryption for AP
First, it is important to understand a range of terms. The next section will explain the main terms used here:
Authentication:
Authentication is a process in which the identity, e.g. of a person is determined based on a certain characteristic.
This can be done by fi ngerprint, password or any other proof of authorisation.