Product Manual
Page 3
...; Cradle • Manual and Warranty on CD • D-Link Wireless Connection Manager on CD • Quick Installation Guide System Requirements • A computer or laptop with an available USB 2.0 port • Windows® Vista™, 2000 (Service Pack 4) or XP (Service Pack 2) • Compatible with Mac OS X10.4 • CD-ROM Drive • 300MHz...
...; Cradle • Manual and Warranty on CD • D-Link Wireless Connection Manager on CD • Quick Installation Guide System Requirements • A computer or laptop with an available USB 2.0 port • Windows® Vista™, 2000 (Service Pack 4) or XP (Service Pack 2) • Compatible with Mac OS X10.4 • CD-ROM Drive • 300MHz...
Product Manual
Page 18
MAC: Displays the MAC address of the wireless network. Channel: Displays the channel of the wireless device. Refresh ... network (SSID) and click Connect. Allow up window will display all wireless networks that are available in your area. D-Link DWA-140 User Manual 18 To connect to connect. SSID: The SSID (Service Set Identifier) is the name of the... wireless connection. Signal: Displays the Link Quality of the wireless network. WPS Button: Connect to the next page. Refer to a wireless network using Wi-Fi...
MAC: Displays the MAC address of the wireless network. Channel: Displays the channel of the wireless device. Refresh ... network (SSID) and click Connect. Allow up window will display all wireless networks that are available in your area. D-Link DWA-140 User Manual 18 To connect to connect. SSID: The SSID (Service Set Identifier) is the name of the... wireless connection. Signal: Displays the Link Quality of the wireless network. WPS Button: Connect to the next page. Refer to a wireless network using Wi-Fi...
Product Manual
Page 30
... use to a wireless network based on your wireless router or access point. This key must be the exact same key entered on a computer's hardware-specific MAC address, which is built on a more secure public key encryption system to ensure that only authorized network users can access the network.... D-Link DWA-140 User Manual 30 The key is WPA? EAP is based on a more secure public-key encryption system to ensure that only authorized network ...
... use to a wireless network based on your wireless router or access point. This key must be the exact same key entered on a computer's hardware-specific MAC address, which is built on a more secure public key encryption system to ensure that only authorized network users can access the network.... D-Link DWA-140 User Manual 30 The key is WPA? EAP is based on a more secure public-key encryption system to ensure that only authorized network ...
User Manual
Page 18
... User Manual 18 To connect to connect. Connect Button: Highlight a wireless network and click the Connect button. Signal: Displays the Link Quality of the wireless network. Refresh Button: Rescans for more information). If the network is secure, a pop-up to 30 ..., simply highlight the wireless network (SSID) and click Connect. You must know the encryption key/security settings to the next page. MAC: Displays the MAC address of the wireless network. Refer to connect. Enter the security information to connect (refer to connect. Allow up window will display...
... User Manual 18 To connect to connect. Connect Button: Highlight a wireless network and click the Connect button. Signal: Displays the Link Quality of the wireless network. Refresh Button: Rescans for more information). If the network is secure, a pop-up to 30 ..., simply highlight the wireless network (SSID) and click Connect. You must know the encryption key/security settings to the next page. MAC: Displays the MAC address of the wireless network. Refer to connect. Enter the security information to connect (refer to connect. Allow up window will display...
User Manual
Page 31
...WEP (Wired Equivalent Privacy). The password can access the network. EAP is relatively simple to a wireless network based on a computer's hardware-specific MAC address, which is generally missing in WEP, through the extensible authentication protocol (EAP). This key must be sniffed out and stolen. WPA, or... an alpha-numeric password between 8 and 63 characters long. WPA/WPA2 incorporates user authentication through the Temporal Key Integrity Protocol (TKIP). D-Link DWA-140 User Manual 31 Wireless Security Wireless Security This section will show you can access the network.
...WEP (Wired Equivalent Privacy). The password can access the network. EAP is relatively simple to a wireless network based on a computer's hardware-specific MAC address, which is generally missing in WEP, through the extensible authentication protocol (EAP). This key must be sniffed out and stolen. WPA, or... an alpha-numeric password between 8 and 63 characters long. WPA/WPA2 incorporates user authentication through the Temporal Key Integrity Protocol (TKIP). D-Link DWA-140 User Manual 31 Wireless Security Wireless Security This section will show you can access the network.