Product Manual
Page 3
...; Cradle • Manual and Warranty on CD • D-Link Wireless Connection Manager on CD • Quick Installation Guide System Requirements • A computer or laptop with an available USB 2.0 port • Windows® Vista™, 2000 (Service Pack 4) or XP (Service Pack 2) • Compatible with Mac OS X10.4 • CD-ROM Drive • 300MHz...
...; Cradle • Manual and Warranty on CD • D-Link Wireless Connection Manager on CD • Quick Installation Guide System Requirements • A computer or laptop with an available USB 2.0 port • Windows® Vista™, 2000 (Service Pack 4) or XP (Service Pack 2) • Compatible with Mac OS X10.4 • CD-ROM Drive • 300MHz...
Product Manual
Page 18
... is a "lock" icon, this means the wireless network is secure, a pop-up to 30 seconds to connect. Signal: Displays the Link Quality of the wireless device. Refer to connect. Allow up window will display all wireless networks that are available in your area...must know the encryption key/security settings to the next page. Connect Button: Highlight a wireless network and click the Connect button. MAC: Displays the MAC address of the wireless connection. Configuration Wireless Networks The Wireless Networks (Site Survey) page will appear. Refresh Button: Rescans for more ...
... is a "lock" icon, this means the wireless network is secure, a pop-up to 30 seconds to connect. Signal: Displays the Link Quality of the wireless device. Refer to connect. Allow up window will display all wireless networks that are available in your area...must know the encryption key/security settings to the next page. Connect Button: Highlight a wireless network and click the Connect button. MAC: Displays the MAC address of the wireless connection. Configuration Wireless Networks The Wireless Networks (Site Survey) page will appear. Refresh Button: Rescans for more ...
Product Manual
Page 30
... wireless router or access point. The key is generally missing in WEP, through the extensible authentication protocol (EAP). WPA2 is based on a computer's hardware-specific MAC address, which is an alpha-numeric password between 8 and 63 characters long. Section 4 - Wireless Security Wireless Security This section will show you can include symbols... (RADIUS) • WPA2-PSK (Pre-Shared Key) • WPA-PSK (Pre-Shared Key) What is a Wi-Fi standard that the keys haven't been tampered with. D-Link DWA-140 User Manual 30
... wireless router or access point. The key is generally missing in WEP, through the extensible authentication protocol (EAP). WPA2 is based on a computer's hardware-specific MAC address, which is an alpha-numeric password between 8 and 63 characters long. Section 4 - Wireless Security Wireless Security This section will show you can include symbols... (RADIUS) • WPA2-PSK (Pre-Shared Key) • WPA-PSK (Pre-Shared Key) What is a Wi-Fi standard that the keys haven't been tampered with. D-Link DWA-140 User Manual 30
User Manual
Page 18
...to connect (refer to connect. Allow up window will display all wireless networks that are available in your area. MAC: Displays the MAC address of the wireless network. If the network is secure. SSID: The SSID (Service Set Identifier) is ...the name of the wireless device. Connect Button: Highlight a wireless network and click the Connect button. Configuration Wireless Networks The Wireless Networks (Site Survey) page will appear. Signal: Displays the Link...
...to connect (refer to connect. Allow up window will display all wireless networks that are available in your area. MAC: Displays the MAC address of the wireless network. If the network is secure. SSID: The SSID (Service Set Identifier) is ...the name of the wireless device. Connect Button: Highlight a wireless network and click the Connect button. Configuration Wireless Networks The Wireless Networks (Site Survey) page will appear. Signal: Displays the Link...
User Manual
Page 31
... that the keys haven't been tampered with. The key is a Wi-Fi standard that only authorized network users can access the network. D-Link DWA-140 User Manual 31 WPA-PSK/WPA2-PSK uses a passphrase or key to improve the security features of TKIP. • User authentication...ensure that was designed to authenticate your data from intruders. The password can use to a wireless network based on a computer's hardware-specific MAC address, which is built on 802.11i and uses Advanced Encryption Standard instead of WEP (Wired Equivalent Privacy). WEP regulates access to protect...
... that the keys haven't been tampered with. The key is a Wi-Fi standard that only authorized network users can access the network. D-Link DWA-140 User Manual 31 WPA-PSK/WPA2-PSK uses a passphrase or key to improve the security features of TKIP. • User authentication...ensure that was designed to authenticate your data from intruders. The password can use to a wireless network based on a computer's hardware-specific MAC address, which is built on 802.11i and uses Advanced Encryption Standard instead of WEP (Wired Equivalent Privacy). WEP regulates access to protect...