
33
128 bit Encryption: when you select 128 bit encryption, you
must type 26 values in the following range (0~F, hexadecimal) in
key 1 to key 4, or 128bit in ASCII format, you must type 13 values
in the following range (0~9, A~Z and a~z Alphanumeric).
Default Key: select the default key that you want to use in this
Wireless Broadband Router.
Authentication Type:
Open System:
with the same WEP key between the stations, the
stations don’t need to be authenticated, and this algorithm is mostly
used.
Shared Key:
with the same WEP key between the stations in this
Authentication algorithm, this type will use packets with encryption
by transferring a challenge text which will be acknowledge by both
side of the stations.
Auto:
by selecting this auto mode, the system will automatically
select which authentication type is suitable for the WLAN networking.
34
2-4-2 AP Client List
The AP client list allows you to see which clients are connected to this
Wireless Broadband Router via MAC address.
Use “Refresh” button to display the new list of the connected clients
2-5 NAT
Network Address Translation (NAT) allows multiple users at the local site
to access the Internet through a single public IP address. NAT can also
prevent hacker attacks by mapping local addresses to public addresses for
key services such as the Web or FTP.
2-5-1 Special Application
Some applications require multiple connections, such as Internet gaming,
video conferencing, Internet telephony and others. These applications
cannot work when Network Address Translation (NAT) is enabled. When
users send this type of request to your network via the Internet, the Router
will forward those requests to the appropriate PC. If you need to run
applications that require multiple connections, specify the port normally
associated with an application in the "Trigger Port" field, select the
protocol type as TCP or UDP, then enter the public ports associated with
the trigger port to open them for inbound traffic.
TCP (
Transmission Control Protocol) - A method (protocol) used
along with the Internet Protocol (Internet Protocol) to send data in
the form of message units between computers over the Internet.
While IP takes care of handling the actual delivery of the data, TCP
takes care of keeping track of the individual units of data (called
packets) that a message is divided into for efficient routing through
the Internet.