User manual MOTOROLA WE800G

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual MOTOROLA WE800G. We hope that this MOTOROLA WE800G user guide will be useful to you.

Lastmanuals help download the user guide MOTOROLA WE800G.


Mode d'emploi MOTOROLA WE800G
Download

You may also download the following manuals related to this product:

   MOTOROLA WE800G DATA SHEET (61 ko)
   MOTOROLA WE800G QUICK START (339 ko)
   MOTOROLA WE800G SUPPLEMENTARY GUIDE (127 ko)

Manual abstract: user guide MOTOROLA WE800G

Detailed instructions for use are in the User's Guide.

[. . . ] User Guide Wireless Ethernet Bridge WE800G WARNING: TO PREVENT FIRE OR SHOCK HAZARD, DO NOT EXPOSE THIS PRODUCT TO RAIN OR MOISTURE. THE UNIT MUST NOT BE EXPOSED TO DRIPPING OR SPLASHING. DO NOT PLACE OBJECTS FILLED WITH LIQUIDS, SUCH AS VASES, ON THE UNIT. CAUTION: TO ENSURE REGULATORY COMPLIANCE, USE ONLY THE PROVIDED POWER AND INTERFACE CABLES. [. . . ] Infrastructure Ac-Hoc Network Type SECTION 3, CONFIGURATION 3-5 SECTION 3 Wireless ­ Security CONFIGURATION This screen enables wireless security settings. To access the screen, click Wireless Profile 1 or 2 > Security. Click APPLY to save your settings or CANCEL to cancel changes. Field SSID Broadcast Description Service Set Identifier (SSID). Broadcasts the SSID of the Wireless Ethernet Bridge to devices on your network. This option is only available when Ad-Hoc is enabled. This enables wireless clients, like a laptop, to receive the Wireless Ethernet Bridge's SSID and then join the Ad-Hoc network. If you don't want the SSID to be broadcast, disable this feature. The default is enabled. 3-6 SECTION 3, CONFIGURATION CONFIGURATION Field ESS Auth Mode Description SECTION 3 Extended Service Set (ESS) Authentication Mode. Authentication differs from Encryption in that you are establishing either an open or secure verification of communication with an AP. This setting does not encrypt your transmission. The options are: Open System The Open System Authentication method is used, meaning the AP you are trying to associate with will not verify the identification of your unit. The Pre-Shared Key (PSK) authentication method is used. You need to share the same key between your AP and client. Pre-Shared Key (PSK) Select the option that best meets your needs. Shared Key is the best choice as it provides the stronger security. Encryption Status Determines the type of security encryption algorithms for the Key Index. The security setting encrypts your wireless transmission. The options are: None WEP64 WEP128 No security Wired Equivalent Privacy - 64-bit strength (provides 4 Keys) Wired Equivalent Privacy 128-bit strength (provides 2 Keys) Select the option that best matches your needs. Motorola recommends using WEP128 because it provides a stronger security algorithm. The default is None. SECTION 3, CONFIGURATION 3-7 SECTION 3 Field Passphrase Description CONFIGURATION Enter the Passphrase to be used for Key encryption. This is the Passphrase used by other Access Points (AP), so you must enter the same phrase for all of the Motorola client devices on your wireless LAN. The Passphrase must be between 8 and 63 characters. Available if Shared Key in ESS Auth Mode is selected. [. . . ] The protocol of the enclosing packet is understood by each endpoint, or tunnel interface, where the packet enters and exits the network. VPNs rely on tunneling to create a secure network. Tunneling requires the following protocol types: !A carrier protocol, such as TCP, used by the network that the data travels over An encapsulating protocol, such as IPSec, L2F, L2TP, or PPTP, that is wrapped around the original data A passenger protocol, such as IP, for the original data U UDP User Datagram Protocol. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE MOTOROLA WE800G

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual MOTOROLA WE800G will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag