
Appendix D Wireless LANs
FSG1100HN User’s Guide
Security Parameters Summary
Refer to this table to see what other security parameters you should
configure for each Authentication Method/ key management protocol type.
MAC address filters are not dependent on how you configure these security
features.
Wireless Security Relational Matrix
METHOD/KEY
MANAGEMENT
METHOD
MANUAL
KEY
Enable without Dynamic WEP Key
Enable with Dynamic WEP Key
Enable without Dynamic WEP Key
Enable with Dynamic WEP Key
Enable without Dynamic WEP Key
Komentarze do niniejszej Instrukcji