RE355 V1 User Guide
Page 39
... hacker attack designed to the wireless network name. ● WEP (Wired Equivalent Privacy) - It corresponds to the ESSID in the wireless Access Point and to prevent your computer or network from operating or communicating. ● DSL (Digital Subscriber Line) - WPA is built-in authentication ...SSID. The size in a network to the shortcomings of WEP. This is the Temporal Key Integrity Protocol (TKIP). products. ● Access Point (Range Extender) - A descriptive name for products using TKIP, WPA-Personal automatically changes the keys at a preset time interval, making it...
... hacker attack designed to the wireless network name. ● WEP (Wired Equivalent Privacy) - It corresponds to the ESSID in the wireless Access Point and to prevent your computer or network from operating or communicating. ● DSL (Digital Subscriber Line) - WPA is built-in authentication ...SSID. The size in a network to the shortcomings of WEP. This is the Temporal Key Integrity Protocol (TKIP). products. ● Access Point (Range Extender) - A descriptive name for products using TKIP, WPA-Personal automatically changes the keys at a preset time interval, making it...