
Network Security Settings
6-3
6.
If needed, you can set the maximum wireless data rate and transmit power. If
located close to an access point, you can reduce the transmit power while
maintaining a high data rate.
7.
When configuration settings are complete, press the Right Soft key to return to
the Wireless Configuration list. The new network is added to the list.
You can select the network you want to connect to from the options menu.
Changing your network selection requires the phone to restart.
Network Security Settings
Wireless networks can be configured as “open systems” that broadcast a beacon
signal including the configured SSID. Wireless clients with a configured SSID of
“any” can read the SSID from the beacon and automatically set their SSID to allow
immediate connection to the network. Secure wireless networks implement one of
several types of user authentication and data encryption to prevent unauthorized
access.
Wired Equivalent Privacy (WEP) provides a basic level of security, preventing
unauthorized access to the network and encrypting data transmitted between
wireless clients and the access point. WEP uses static shared keys (fixed-length
hexadecimal or alphanumeric strings) that are manually distributed to all clients that
want to use the network.
Wi-Fi Protected Access (WPA) employs a combination of technologies to provide an
enhanced security solution for wireless networks. The WPA Pre-shared Key
(WPA-PSK) mode for small networks uses a common password phrase that must be
manually distributed to all clients that want to connect to the network.
WPA2 is a futher security enhancement that includes the now ratified IEEE 802.11i
wireless security standard. Both WPA and WPA2 provide very robust security
through the support of the Advanced Encryption Standard (AES) and Temporal Key
Integrity Protocol (TKIP) encryption ciphers.
If the network you want to connect to uses security, the network operator should
provide details of the security used and the appropriate encryption keys.
The Wi-Fi Phone supports the following security mechanisms:
• WEP shared key
• WPA Pre-shared Key
• WPA2 Pre-shared Key
Содержание TigerVoIP SMCWSP-100
Страница 1: ...USER GUIDE Wi Fi SIP Phone SMCWSP 100 ...
Страница 2: ......
Страница 14: ...Introduction 1 4 ...
Страница 18: ...Installing the Battery 2 4 ...
Страница 26: ...Getting Started 3 8 ...
Страница 68: ...Software Upgrade B 4 ...
Страница 75: ......