User manual HAWKING HWU54DM DOCUMENT

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual HAWKING HWU54DM. We hope that this HAWKING HWU54DM user guide will be useful to you.


HAWKING HWU54DM DOCUMENT: Download the complete user guide (1767 Ko)

Manual abstract: user guide HAWKING HWU54DMDOCUMENT

Detailed instructions for use are in the User's Guide.

[. . . ] Trademarks & Copyright Windows 95/98/ME and Windows NT /2000/XP are registered trademarks of Microsoft Corp. All other brands and product names are trademarks of their respective companies. No part of this publication may be reproduced in any form or by any means or used to make any derivative (such as translation, transformation or adaptation) without the express written consent of the manufacturer as stipulated by the United States Copyright Act of 1976. FCC Warning This equipment has been tested and found to comply with the regulations for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. [. . . ] Shared ­ Only wireless stations using a shared key (WEP Key identified) are allowed to connecting each other. Allows dynamic WEP keys and mutual authentication between a wireless client and a RADIUS server. LEAP allows for clients to reauthenticate frequently; upon each successful authentication, the clients acquire a new WEP key WPA-PSK ­ It is a special mode designed for home and small business users who do not have access to network authentication servers. In this mode, known as Pre-Shared Key, the user manually enters the starting password in their access point or gateway, as well as in each wireless stations in the network. WPA takes over automatically from that point, keeping unauthorized users that don't have the matching password from joining the networ k, while encrypting the data traveling between authorized devices. Option available on Windows XP computers only. Parameter Encryption Mode Description None ­ Disable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP ­ TKIP (Temporal Key Integ rity Protocol) changes the temporal key every 10, 000 packets (a packet is a kind of message transmitted over a network. ) This insures much greater security than the standard WEP security. AES ­ AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802. 11i for the security in the wireless network. 14 Note: All devices in the network should use the same encryption method to ensure the communication. WPA Pre-Shared Key The WPA-PSK key can be from eight to 64 characters and can be letters or numbers. This same key must be used on all of the wireless stations in the network. WEP Key (Key1 ~ Key4) The WEP keys are used to encrypt data transmitted in the wireless network. Select the default encryption key from Key 1 to Key 4 by selected the radio button. 64-bit ­ Input 10-digit Hex values (in the "A-F", "a-f" and "0 -9 " range) or 5-digit ASCII characters (including "a-z" and "0 -9 ") as the encryption keys . 128 -bit ­ Input 26-digit Hex values (in the "A-F", "a-f" and "0-9" range) or 13-digit ASCII characters (including "a -z" and "0-9") as the encryption keys . For example: "01234567890123456789abcdef" or "administrator". 4. 3. 3 Enable WPA in Windows XP You can opt to use the XP's built-in wireless Zero Configuration Utility (ZCU) to control your wireless adapter settings and to enable security with full WPA and WEP authentication. Wi-Fi Protected Access (WPA) is a specification of standards-based, interoperable security enhancement that strongly increases the level of data protection (encryption) and access control (authentication) for existing and future wireless LAN systems. The technical components of WPA include Temporal Key Integrity Protocol (TKIP) for dynamic key exchange, and 802. 1x for authentication. There are two types of WPA security: WPA-PSK (no server) and WPA (with server). WPA requires a Radius Server to complete authentication among wireless stations and Access Points. A pre-shared key is a password that e very wireless station must use to access the network. Typically, this mode will be used in a home environment. 15 To enable the WPA function in Windows XP, the following software systems are required: 1. [. . . ] Compare with AES, TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at the hardware level. 10. Therefore, Wireless products can work with Netware, Windows 2000, or other LAN operating systems to support printer or file sharing. On the hardware side, as with Direct Sequence Spread Spectrum technology, it has the inherent security feature of scrambling. On the software side, WLAN series offer the encryption function (WEP) to enhance security and Access Control. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE HAWKING HWU54DM




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual HAWKING HWU54DM will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.