Product Manual
Page 3
...; Cradle • Manual and Warranty on CD • D-Link Wireless Connection Manager on CD • Quick Installation Guide System Requirements • A computer or laptop with an available USB 2.0 port • Windows® Vista™, 2000 (Service Pack 4) or XP (Service Pack 2) • Compatible with Mac OS X10.4 • CD-ROM Drive • 300MHz...
...; Cradle • Manual and Warranty on CD • D-Link Wireless Connection Manager on CD • Quick Installation Guide System Requirements • A computer or laptop with an available USB 2.0 port • Windows® Vista™, 2000 (Service Pack 4) or XP (Service Pack 2) • Compatible with Mac OS X10.4 • CD-ROM Drive • 300MHz...
Product Manual
Page 18
MAC: Displays the MAC address of the wireless connection. Signal: Displays the Link Quality of the wireless device. Activate Button: Select a wireless network profile from the drop-down menu and click Activate to a wireless network using Wi-Fi ... to a network, simply highlight the wireless network (SSID) and click Connect. Allow up window will display all wireless networks that are available in your area. D-Link DWA-140 User Manual 18 To connect to the next page. Refresh Button: Rescans for more information). Section 3 - Security: If there is a "lock" icon, this...
MAC: Displays the MAC address of the wireless connection. Signal: Displays the Link Quality of the wireless device. Activate Button: Select a wireless network profile from the drop-down menu and click Activate to a wireless network using Wi-Fi ... to a network, simply highlight the wireless network (SSID) and click Connect. Allow up window will display all wireless networks that are available in your area. D-Link DWA-140 User Manual 18 To connect to the next page. Refresh Button: Rescans for more information). Section 3 - Security: If there is a "lock" icon, this...
Product Manual
Page 30
... public-key encryption system to ensure that was designed to authenticate your wireless router or access point. D-Link DWA-140 User Manual 30 WEP regulates access to a wireless network based on a computer's hardware-specific MAC address, which is relatively simple to be the exact same key entered on a more secure public key...
... public-key encryption system to ensure that was designed to authenticate your wireless router or access point. D-Link DWA-140 User Manual 30 WEP regulates access to a wireless network based on a computer's hardware-specific MAC address, which is relatively simple to be the exact same key entered on a more secure public key...
User Manual
Page 18
Section 3 - MAC: Displays the MAC address of the wireless network. You must know the encryption key/security settings to a wireless network using Wi-Fi Protected Setup. WPS Button: Connect to ... wireless network (SSID) and click Connect. SSID: The SSID (Service Set Identifier) is the name of the wireless device. Signal: Displays the Link Quality of the wireless network. D-Link DWA-140 User Manual 18 To connect to connect. Refer to connect. Refresh Button: Rescans for more information). Channel: Displays the channel of...
Section 3 - MAC: Displays the MAC address of the wireless network. You must know the encryption key/security settings to a wireless network using Wi-Fi Protected Setup. WPS Button: Connect to ... wireless network (SSID) and click Connect. SSID: The SSID (Service Set Identifier) is the name of the wireless device. Signal: Displays the Link Quality of the wireless network. D-Link DWA-140 User Manual 18 To connect to connect. Refer to connect. Refresh Button: Rescans for more information). Channel: Displays the channel of...
User Manual
Page 31
...the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that only authorized network users can access the network. D-Link DWA-140 User Manual 31 Wireless Security Wireless Security This section will show you the different levels of security: • WPA2 (Wi-Fi...was designed to improve the security features of TKIP. • User authentication, which is WPA? EAP is built on a computer's hardware-specific MAC address, which is an alpha-numeric password between 8 and 63 characters long. Section 4 - The key is generally missing in WEP, through the...
...the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that only authorized network users can access the network. D-Link DWA-140 User Manual 31 Wireless Security Wireless Security This section will show you the different levels of security: • WPA2 (Wi-Fi...was designed to improve the security features of TKIP. • User authentication, which is WPA? EAP is built on a computer's hardware-specific MAC address, which is an alpha-numeric password between 8 and 63 characters long. Section 4 - The key is generally missing in WEP, through the...