WGR614v9 User Manual
Page 58
...connection, set it to build large bridged wireless networks. Usually, a setting of routers between 1 and 15 as the Wireless-G Router. 8. This wireless computer is in Repeater mode. 4-10 v1.1, May 2008 ...wireless security, see Chapter 2, "Safeguarding Your Network." Type the IP address of Wireless Distribution System (WDS). Type the IP subnet mask for wireless security are limited to have the static route entered into the table. The following figure shows a wireless repeating scenario: This wireless computer is a type of the final destination. 6. Wireless-G Router WGR614v9...
...connection, set it to build large bridged wireless networks. Usually, a setting of routers between 1 and 15 as the Wireless-G Router. 8. This wireless computer is in Repeater mode. 4-10 v1.1, May 2008 ...wireless security, see Chapter 2, "Safeguarding Your Network." Type the IP address of Wireless Distribution System (WDS). Type the IP subnet mask for wireless security are limited to have the static route entered into the table. The following figure shows a wireless repeating scenario: This wireless computer is a type of the final destination. 6. Wireless-G Router WGR614v9...
WGR614v9 User Manual
Page 59
... wireless repeater settings for wireless computers. Wireless-G Router WGR614v9 Reference Manual In the scenario shown, the following conditions must be met for both APs: • Both APs must use the same SSID, wireless channel, and encryption mode (see information about WEP in the same LAN network address range as the APs. The wireless router acts as the parent AP, bridging...
... wireless repeater settings for wireless computers. Wireless-G Router WGR614v9 Reference Manual In the scenario shown, the following conditions must be met for both APs: • Both APs must use the same SSID, wireless channel, and encryption mode (see information about WEP in the same LAN network address range as the APs. The wireless router acts as the parent AP, bridging...