User Manual
Page 4
z Supports operating system: Windows OS 2000/XP/XP64/Vista, MAC OS 10.4.x /10.5.x and Linux z Supports WPS configuration button. (EW-7717Un, EW-7727In, EW-7738Pn, EW-7748In only) z Supports USB 2.0/1.1 interface. (EW-7318USg, EW-7318Ug, EW-7718Un, EW-7717Un only) 3 CHAPTER I: Product Information 1-1 Introduction and safety information Thank you for high security level. z Provides further coverage, less dead spot and high throughput...
z Supports operating system: Windows OS 2000/XP/XP64/Vista, MAC OS 10.4.x /10.5.x and Linux z Supports WPS configuration button. (EW-7717Un, EW-7727In, EW-7738Pn, EW-7748In only) z Supports USB 2.0/1.1 interface. (EW-7318USg, EW-7318Ug, EW-7718Un, EW-7717Un only) 3 CHAPTER I: Product Information 1-1 Introduction and safety information Thank you for high security level. z Provides further coverage, less dead spot and high throughput...
User Manual
Page 77
... you inputted will be shown, but the data transfer speed will be slightly reduced. Cancel Click this button to save changes you made in this window. 76 OK Click this button to discard all changes you made in this page. If you want to use WEP 128bits encryption, please input 26... ASCII. 128 bits encryption is safer then 64 bits, but not replaced by asterisk (*). If you want to use WEP 64 bits encryption, please input 10 characters if you select HEX, or input 5 characters if you select ASCII;
... you inputted will be shown, but the data transfer speed will be slightly reduced. Cancel Click this button to save changes you made in this window. 76 OK Click this button to discard all changes you made in this page. If you want to use WEP 128bits encryption, please input 26... ASCII. 128 bits encryption is safer then 64 bits, but not replaced by asterisk (*). If you want to use WEP 64 bits encryption, please input 10 characters if you select HEX, or input 5 characters if you select ASCII;
User Manual
Page 89
...WEP security until manufacturers implement AES at a departmental scale for a branch or SOHO operation. 5. What is Infrastructure? Compare with Netware, Windows 2000, or other LAN operating systems to ensure the highest degree of security and authenticity for mobile workers. 6. Therefore, Wireless products ... has been developed to support printer or file sharing. 88 An Ad-hoc integrated wireless LAN is applicable at the hardware level. 10. Infrastructure is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in WEP security...
...WEP security until manufacturers implement AES at a departmental scale for a branch or SOHO operation. 5. What is Infrastructure? Compare with Netware, Windows 2000, or other LAN operating systems to ensure the highest degree of security and authenticity for mobile workers. 6. Therefore, Wireless products ... has been developed to support printer or file sharing. 88 An Ad-hoc integrated wireless LAN is applicable at the hardware level. 10. Infrastructure is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in WEP security...