Product Manual
Page 18
... - Connect Button: Highlight a wireless network and click the Connect button. If the network is secure, a pop-up to 30 seconds to connect. D-Link DWA-130 User Manual 18 SSID: The SSID (Service Set Identifier) is secure.You must know the encryption key/security settings to connect. Enter the security information... channel of the wireless network. Activate Button: Select a wireless network profile from the drop-down menu and click Activate to connect. MAC: Displays the MAC address of the wireless connection. Signal: Displays the Link Quality of the wireless device.
... - Connect Button: Highlight a wireless network and click the Connect button. If the network is secure, a pop-up to 30 seconds to connect. D-Link DWA-130 User Manual 18 SSID: The SSID (Service Set Identifier) is secure.You must know the encryption key/security settings to connect. Enter the security information... channel of the wireless network. Activate Button: Select a wireless network profile from the drop-down menu and click Activate to connect. MAC: Displays the MAC address of the wireless connection. Signal: Displays the Link Quality of the wireless device.
Product Manual
Page 30
... wireless router or access point. The DWA-130 offers the following types of TKIP. • User authentication, which is an alpha-numeric password between 8 and 63 characters long. D-Link DWA-130 User Manual 30 The 2 major improvements... over WEP: • Improved data encryption through the Extensible Authentication Protocol (EAP). EAP is generally missing in WEP, through the extensible authentication protocol (EAP). This key must be sniffed out and stolen. EAP is built on a computer's hardware-specific MAC...
... wireless router or access point. The DWA-130 offers the following types of TKIP. • User authentication, which is an alpha-numeric password between 8 and 63 characters long. D-Link DWA-130 User Manual 30 The 2 major improvements... over WEP: • Improved data encryption through the Extensible Authentication Protocol (EAP). EAP is generally missing in WEP, through the extensible authentication protocol (EAP). This key must be sniffed out and stolen. EAP is built on a computer's hardware-specific MAC...