Product Manual
Page 3
...; Cradle • Manual and Warranty on CD • D-Link Wireless Connection Manager on CD • Quick Installation Guide System Requirements • A computer or laptop with an available USB 2.0 port • Windows® Vista™, 2000 (Service Pack 4) or XP (Service Pack 2) • Compatible with Mac OS X10.4 • CD-ROM Drive • 300MHz...
...; Cradle • Manual and Warranty on CD • D-Link Wireless Connection Manager on CD • Quick Installation Guide System Requirements • A computer or laptop with an available USB 2.0 port • Windows® Vista™, 2000 (Service Pack 4) or XP (Service Pack 2) • Compatible with Mac OS X10.4 • CD-ROM Drive • 300MHz...
Product Manual
Page 18
MAC: Displays the MAC address of the wireless network. Connect Button: Highlight a wireless network ... menu and click Activate to the next page. Enter the security information to connect (refer to connect. D-Link DWA-140 User Manual 18 Channel: Displays the channel of the wireless device. To connect to a wireless network... using Wi-Fi Protected Setup. Signal: Displays the Link Quality of the wireless network. WPS Button: Connect to a network, simply highlight the wireless network (SSID) and click ...
MAC: Displays the MAC address of the wireless network. Connect Button: Highlight a wireless network ... menu and click Activate to the next page. Enter the security information to connect (refer to connect. D-Link DWA-140 User Manual 18 Channel: Displays the channel of the wireless device. To connect to a wireless network... using Wi-Fi Protected Setup. Signal: Displays the Link Quality of the wireless network. WPS Button: Connect to a network, simply highlight the wireless network (SSID) and click ...
Product Manual
Page 30
...EAP). WEP regulates access to protect your data from intruders. The password can use to a wireless network based on a computer's hardware-specific MAC address, which is generally missing in WEP, through the Temporal Key Integrity Protocol (TKIP). WPA-PSK/WPA2-PSK uses a passphrase or key ...). This key must be sniffed out and stolen. WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is WPA? D-Link DWA-140 User Manual 30 Section 4 - WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the...
...EAP). WEP regulates access to protect your data from intruders. The password can use to a wireless network based on a computer's hardware-specific MAC address, which is generally missing in WEP, through the Temporal Key Integrity Protocol (TKIP). WPA-PSK/WPA2-PSK uses a passphrase or key ...). This key must be sniffed out and stolen. WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is WPA? D-Link DWA-140 User Manual 30 Section 4 - WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the...
User Manual
Page 18
... for more information). Connect Button: Highlight a wireless network and click the Connect button. If the network is secure. D-Link DWA-140 User Manual 18 Allow up window will display all wireless networks that are available in your area. Configuration Wireless Networks...to connect. SSID: The SSID (Service Set Identifier) is the name of the wireless network. MAC: Displays the MAC address of the wireless connection. Signal: Displays the Link Quality of the wireless device. Enter the security information to connect (refer to the Wireless Security section...
... for more information). Connect Button: Highlight a wireless network and click the Connect button. If the network is secure. D-Link DWA-140 User Manual 18 Allow up window will display all wireless networks that are available in your area. Configuration Wireless Networks...to connect. SSID: The SSID (Service Set Identifier) is the name of the wireless network. MAC: Displays the MAC address of the wireless connection. Signal: Displays the Link Quality of the wireless device. Enter the security information to connect (refer to the Wireless Security section...
User Manual
Page 31
... major improvements over WEP: • Improved data encryption through the Extensible Authentication Protocol (EAP). EAP is built on your wireless connection. D-Link DWA-140 User Manual 31 WPA-PSK/WPA2-PSK uses a passphrase or key to improve the security features of security you the different levels...The DWA-140 offers the following types of TKIP. • User authentication, which is WPA? WPA2 is based on a computer's hardware-specific MAC address, which is a Wi-Fi standard that only authorized network users can use to a wireless network based on 802.11i and uses Advanced...
... major improvements over WEP: • Improved data encryption through the Extensible Authentication Protocol (EAP). EAP is built on your wireless connection. D-Link DWA-140 User Manual 31 WPA-PSK/WPA2-PSK uses a passphrase or key to improve the security features of security you the different levels...The DWA-140 offers the following types of TKIP. • User authentication, which is WPA? WPA2 is based on a computer's hardware-specific MAC address, which is a Wi-Fi standard that only authorized network users can use to a wireless network based on 802.11i and uses Advanced...