![Samsung Q30 plus Скачать руководство пользователя страница 59](http://html.mh-extra.com/html/samsung/q30-plus/q30-plus_owners-manual_348173059.webp)
4-14
Manual
1. In Available Networks, click on
Refresh
.
2. Select the name of desired access point or computer-to-computer network to
connect from the searched available networks list, and click
Configure
.
3. Enter
Profile Name
and click
Next
.
4. In the Search Security Settings window, the wireless network security search
message will appear. Click
Next.
5. Enter the
network authentication, data encryption (WEP),
encryption level, key index
, and
wireless security password
configured for the target access point or computer-to-computer network in the
Security Settings window, and click Next.
6. The Done window appears, click
OK
.
When a wireless connection to an access point is established, connection icon
(
) appears in front of the name of connected profile.
If your desired network does not appear, click
Refresh
.
An access point is represented by the (
) icon, and a computer-to-computer
network is represented by the (
) icon. An ( ) icon is displayed in front of an
access point or a computer-to-computer network with configured security settings.
N
N
N
N
o
o
o
o
tt
tt
e
e
e
e
The network authentication, data encryption (WEP), key index, and password of a
access point are configured in the access point management program. For infor-
mation on the security information, check the security settings of the access point
or ask your wireless network administrator.
To connect to an existing computer-to-computer (Ad Hoc) network, enter the
password configured when creating the computer-to-computer network for the first
time. You do not need to enter network authentication or key index.
Security Settings
Network authentication
: The network authentication option includes
Open System and Shared Key. When you select Open System, no authentica-
tion is applied (however, encryption is supported). When you select Shared
Key, a WEP key is used for authentication. The default setting is Open System
Data encryption (WEP)
: The IEEE 802.11 WEP (Wired Equivalent Privacy)
standard defines two levels of encryption, a 64-bit key (this is sometimes
represented by 40bits) and a 128-bit key.
Key index
: Select the current encryption key index used by the access point
out of 1 to 4.
To use encryption key
: Click
Use pass phrase
to activate, and enter 5
(for 64-bit) ~ 13 (for 128-bit) alphanumeric characters (represented by 0-9,
a-z, or A-Z).
N
N
N
N
o
o
o
o
tt
tt
e
e
e
e
Содержание Q30 plus
Страница 5: ......
Страница 9: ...1 4 Manual Rear View Bottom View Battery P 5 4 Security Lock Port P 5 8 Speaker Battery Latches ...
Страница 45: ...3 18 Manual ...
Страница 73: ...4 28 Manual ...
Страница 74: ...System Management This chapter provides information on efficient computer management Chapter 5 Chapter 5 ...
Страница 83: ...5 10 Manual ...
Страница 119: ...7 26 Manual ...
Страница 120: ...Appendix System specifications software types and safety instructions are provided here Appendix Appendix ...