Asus USB-AC51 User Manual Page 23

  • Download
  • Add to my manuals
  • Print
  • Page
    / 36
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 22
23
Encryption
This provides wireless data transmissions with a level of security. This option
allows you to specify a 64-bit or a 128-bit WEP key. A 64-bit encryption contains
10 hexadecimal digits or 5 ASCII characters. A 128-bit encryption contains 26
hexadecimal digits or 13 ASCII characters.
64-bit and 40-bit WEP keys use the same encryption method and can
interoperate on wireless networks. This lower level of WEP encryption uses
a 40-bit (10 hexadecimal digits assigned by the user) secret key and a 24-bit
Initialization Vector assigned by the device. 104-bit and 128-bit WEP keys use
the same encryption method.
All wireless clients in a network must have identical WEP keys with the access
point to establish connection. Keep a record of the WEP encryption keys.
Extended Service Set (ESS)
A set of one or more interconnected basic service set (BSSs) and integrated
local area networks (LANs) can be congured as an Extended Service Set.
ESSID (Extended Service Set Identier)
You must have the same ESSID entered into the gateway and each of its
wireless clients. The ESSID is a unique identier for your wireless network.
Ethernet
The most widely used LAN access method, which is dened by the IEEE 802.3
standard. Ethernet is normally a shared media LAN meaning all devices on the
network segment share total bandwidth. Ethernet networks operate at 10Mbps
using CSMA/CD to run over 10-BaseT cables.
Firewall
A rewall determines which information passes in and out of a network. NAT
can create a natural rewall by hiding a local network’s IP addresses from the
Internet. A Firewall prevents anyone outside of your network from accessing
your computer and possibly damaging or viewing your les.
Gateway
A network point that manages all the data trac of your network, as well as to
the Internet and connects one network to another.
ICS
ICS is used to share one computers Internet connection with the rest of the
computers on your network. When this computer is connected to the Internet,
all the communications to and from the Internet on your network are sent
through this computer which is called the host computer. The rest of the
computers can send and receive e-mail messages and access the web as if it
were connected directly to the Internet.
Page view 22
1 ... 22 23 24 ... 36

Comments to this Manuals

No comments