
IAP-W420/W422 UserManual
ORingIndustrial Networking Corp
33
Hide ESSID
Hides the network name (ESSID) from being broadcast publicly.
(This option is for a device operating as an AP.)
WMM Mode
Provides Quality of Service (QoS) features, checked by default.
Wireless multimedia enables the classification of the network
traffic into 4 main types, voice, video, best effort, and background,
in decreasing order of priority. Higher priority traffic has a higher
transmission opportunity and would have to wait less time to
transmit. As a result, an existing video stream would not be
interrupted by additional background processes.
Label
Description
Encryption
Choose an encryption method from the drop-down list. Wired
Equivalent Privacy (WEP) is the oldest and least secure
encryption algorithm. Stronger encryption using WPA or WPA2
should be used where possible.For the WEP Open System and
WEP Shared Keyencryptions, you can specify up to 4 keys and
only 1 would be used at a time.
Used Key Slot
: Chooses between Key #1 to Key #4.
Key 1 ~ Key
4
: Specifies a string of characters to be used asthe password. It
may consist of 5 ASCII characters or10 HEX characters, implying
a 64-bit WEP key length. Otherwise, it may consist of 13 ASCII or
26 HEX characters, implying a 128-bit key length.
Wifi protected access (WPA) is a stronger encryptionthan
WEP.Furthermore, WPA2 was developed to strengthen the
security of WPA and is stronger than WPA and WEP.
Cipher
: Can
be set to CCMP (AES), TKIP, or TKIP and CCMP (AES). The
Temporal Key Integrity Protocol (TKIP) was developed as a
temporary replacement for WEP. The Counter Mode Cipher Block
Chaining Message Authentication Code Protocol (CCMP) is
based on the Advanced Encryption Standard (AES) and is the
most secure protocol.