Cisco WBP54G - Small Business Pro Wireless-G Bridge Benutzerhandbuch - Seite 16
Blättern Sie online oder laden Sie pdf Benutzerhandbuch für Drahtloser Zugangspunkt Cisco WBP54G - Small Business Pro Wireless-G Bridge herunter. Cisco WBP54G - Small Business Pro Wireless-G Bridge 50 Seiten. Bridge for phone adapters
Auch für Cisco WBP54G - Small Business Pro Wireless-G Bridge: Handbuch zur Schnellinstallation (2 seiten)
Wireless-G Bridge for Phone Adapters
9. Configure the wireless security settings. Select the method your network is using, WPA, WPA2, WEP (128-Bit),
or WEP (64-Bit). Then proceed to the appropriate instructions. If you are not using wireless security, select
Disabled, and proceed to step 10.
WPA
WPA automatically uses TKIP with dynamic encryption keys. Enter a passphrase on this screen.
Encryption - TKIP is automatically selected as the encryption method.
Passphrase - Enter a Passphrase, also called a pre-shared key, of 8-63 characters in the Passphrase field.
The longer and more complex your Passphrase is, the more secure your network will be.
Click Next to proceed, or click Back to return to the previous screen.
WPA2
WPA2 automatically uses AES with dynamic encryption keys (AES is a stronger encryption method than TKIP).
Enter a passphrase on this screen.
Encryption - AES is automatically selected as the encryption method.
Passphrase - Enter a Passphrase, also called a pre-shared key, of 8-63 characters in the Passphrase field.
The longer and more complex your Passphrase is, the more secure your network will be.
Click Next to proceed, or click Back to return to the previous screen.
Chapter 4: Setting Up and Connecting the Wireless-G Bridge for Phone Adapters
Running the Setup Wizard
encryption: encoding data transmitted in a network.
wpa (wi-fi protected access): a wireless security protocol
using TKIP (Temporal Key Integrity Protocol) encryption.
wpa2 (wi-fi protected access 2): a wireless security protocol
using AES (Advanced Encryption Standard) encryption.
wep (wired equivalent privacy): a method of encrypting network
data transmitted on a wireless network.
Figure 4-9: Security Settings - WPA Screen
Figure 4-10: Security Settings - WPA2 Screen
11