
Chapter 7 Wireless LAN
P-2812HNU-51c User’s Guide
130
A good way to come up with effective security keys, passwords and so on is to use
obscure information that you personally will easily remember, and to enter it in a
way that appears random and does not include real words. For example, if your
mother owns a 1970 Dodge Challenger and her favorite movie is Vanishing Point
(which you know was made in 1971) you could use “70dodchal71vanpoi” as your
security key.
Signal Problems
Because wireless networks are radio networks, their signals are subject to
limitations of distance, interference and absorption.
Problems with distance occur when the two radios are too far apart. Problems with
interference occur when other radio waves interrupt the data signal. Interference
may come from other radio transmissions, such as military or air traffic control
communications, or from machines that are coincidental emitters such as electric
motors or microwaves. Problems with absorption occur when physical objects
(such as thick walls) are between the two radios, muffling the signal.
7.3 Before You Begin
Before you start using these screens, ask yourself the following questions. See
if some of the terms used here do not make sense to
you.
• What wireless standards do the other wireless devices support (IEEE 802.11g,
for example)? What is the most appropriate standard to use?
• What security options do the other wireless devices support (WPA-PSK, for
example)? What is the best one to use?
• Do the other wireless devices support WPS (Wi-Fi Protected Setup)? If so, you
can set up a well-secured network very easily.
Even if some of your devices support WPS and some do not, you can use WPS to
set up your network and then add the non-WPS devices manually, although this
is somewhat more complicated to do.
• What advanced options do you want to configure, if any? If you want to
configure advanced options, ensure that you know precisely what you want to
do. If you do not want to configure advanced options, leave them alone.
Содержание P-2812HNU-51c
Страница 2: ......
Страница 8: ...Safety Warnings P 2812HNU 51c User s Guide 8 ...
Страница 10: ...Contents Overview P 2812HNU 51c User s Guide 10 ...
Страница 19: ...19 PART I User s Guide ...
Страница 20: ...20 ...
Страница 73: ...73 PART II Technical Reference ...
Страница 74: ...74 ...
Страница 88: ...Chapter 4 Status Screens P 2812HNU 51c User s Guide 88 ...
Страница 118: ...Chapter 5 WAN Setup P 2812HNU 51c User s Guide 118 ...
Страница 204: ...Chapter 9 Voice P 2812HNU 51c User s Guide 204 ...
Страница 210: ...Chapter 10 File Sharing P 2812HNU 51c User s Guide 210 ...
Страница 216: ...Chapter 11 Firewall P 2812HNU 51c User s Guide 216 ...
Страница 223: ...Chapter 12 Certificate P 2812HNU 51c User s Guide 223 Figure 99 Certificate Details ...
Страница 232: ...Chapter 13 Static Route P 2812HNU 51c User s Guide 232 ...
Страница 236: ...Chapter 14 Policy Forwarding P 2812HNU 51c User s Guide 236 ...
Страница 252: ...Chapter 16 Quality of Service QoS P 2812HNU 51c User s Guide 252 ...
Страница 274: ...Chapter 19 Universal Plug and Play UPnP P 2812HNU 51c User s Guide 274 ...
Страница 284: ...Chapter 21 Interface Group P 2812HNU 51c User s Guide 284 ...
Страница 288: ...Chapter 22 System Settings P 2812HNU 51c User s Guide 288 ...
Страница 292: ...Chapter 23 Logs P 2812HNU 51c User s Guide 292 ...
Страница 300: ...Chapter 24 Tools P 2812HNU 51c User s Guide 300 ...
Страница 320: ...Chapter 27 Product Specifications P 2812HNU 51c User s Guide 320 ...
Страница 336: ...Appendix A Network Troubleshooting P 2812HNU 51c User s Guide 336 ...
Страница 376: ...Appendix C Pop up Windows JavaScripts and Java Permissions P 2812HNU 51c User s Guide 376 ...
Страница 388: ...Appendix D IP Addresses and Subnetting P 2812HNU 51c User s Guide 388 ...