Product Manual
Page 19
... Only, Mixed 802.11b/g, 802.11b Only, 802.11n Only, or Mixed 802.11b/g/n. Wireless Security You can clone the wireless MAC address to . D-Link DAP-1513 User Manual 19 The drop-down Wireless MAC Clone: menu. Select enable if you want to . 802.11 Mode: Select the appropriate 802.11 mode based on the...
... Only, Mixed 802.11b/g, 802.11b Only, 802.11n Only, or Mixed 802.11b/g/n. Wireless Security You can clone the wireless MAC address to . D-Link DAP-1513 User Manual 19 The drop-down Wireless MAC Clone: menu. Select enable if you want to . 802.11 Mode: Select the appropriate 802.11 mode based on the...
Product Manual
Page 27
It will display the LAN and wireless LAN information. D-Link DAP-1513 User Manual 27 Wireless LAN: Displays the wireless MAC address and your wireless settings such as SSID and Channel. Section 3 - LAN: Displays the MAC address and the private (local) IP settings for the DAP-1513. General: Displays the MediaBridge® time and firmware version. Configuration Status Device Info This page displays the current information for the MediaBridge®.
It will display the LAN and wireless LAN information. D-Link DAP-1513 User Manual 27 Wireless LAN: Displays the wireless MAC address and your wireless settings such as SSID and Channel. Section 3 - LAN: Displays the MAC address and the private (local) IP settings for the DAP-1513. General: Displays the MediaBridge® time and firmware version. Configuration Status Device Info This page displays the current information for the MediaBridge®.
Product Manual
Page 32
WEP regulates access to a wireless network based on a computer's hardware-specific MAC address, which is generally missing in WEP, through the extensible authentication protocol (EAP). The 2 major improvements over WEP: • Improved data encryption through the ...spaces. The key is WPA? This key must be sniffed out and stolen. WPA/WPA2 incorporates user authentication through the Temporal Key Integrity Protocol (TKIP). D-Link DAP-1513 User Manual 32 EAP is a Wi-Fi standard that was designed to ensure that the keys haven't been tampered with. WPA, or Wi-Fi Protected...
WEP regulates access to a wireless network based on a computer's hardware-specific MAC address, which is generally missing in WEP, through the extensible authentication protocol (EAP). The 2 major improvements over WEP: • Improved data encryption through the ...spaces. The key is WPA? This key must be sniffed out and stolen. WPA/WPA2 incorporates user authentication through the Temporal Key Integrity Protocol (TKIP). D-Link DAP-1513 User Manual 32 EAP is a Wi-Fi standard that was designed to ensure that the keys haven't been tampered with. WPA, or Wi-Fi Protected...