Home Useful Tips What is the beacon interval in the router settings. Wi-Fi parameters. Set and forget is the desire of most wireless router users. For them, a wireless router is a simple device that only provides communication

What is the beacon interval in the router settings. Wi-Fi parameters. Set and forget is the desire of most wireless router users. For them, a wireless router is a simple device that only provides communication

802.11g Wireless Gaming Adapter and Ethernet Bridge User Guide

Status Page

The Status page displays, among other additional information, the specific status of the connected network, including the SSID (Service Area ID), the signaling channel, and the version of the firmware you are using.

Note. If the “Device not associated” message appears in the MAC address field, then the 5430 is not associated with a wireless network. If the MAC address field displays the correct MAC address, then the 5430 is associated with a wireless network.

Wireless Menu Options

Use the Wireless menu to change Client mode to Ad Hoc mode and enter the network name (SSID) or select a separate channel for Ad Hoc mode. If you are not sure which SSID (Service Area ID) is set for your network, use the Site Survey function on the Tools tab to find the network for the 5430.

Safety. Using a secured wireless network

The wireless network gives you the freedom to roam without the need for cables. However, anyone within the coverage area of ​​your wireless network can use your data. If there is a possibility that your neighbor or someone in the wireless coverage area may maliciously use your network, it is strongly recommended that you enable the network security feature to prevent unauthorized access or eavesdropping on your network traffic. Today, a large number of wireless routers provide several ways to secure a wireless network, so it is recommended to first enable the security function on the wireless router and then set up security for the network clients in the same way.

WEP encryption
The 5430 supports 64-bit and 128-bit WEP encryption for security. If encryption with a higher key bit value can be used to establish security on the wireless router, we recommend that you use such an encryption key. WEP uses a key to encrypt data that, after this special formatting, can only be recognized by another wireless device that supports the encryption key. If both devices use the same encryption key, then users who do not know this key will not be able to connect to your network and use your Internet connection.

Filtering MAC addresses
A large number of wireless routers allow you to create a list of devices that are allowed to connect to your wireless network. For information on whether MAC address filtering is supported, see the documentation for your wireless router or access point.

Enabling Security on the 5430

Enabling WEP
Once you have obtained the network name (SSID (Service Area ID) configured on the wireless router or access point and its security settings), you can use the Security menu on the Web user interface pages to program WEP security for the 5430.

By selecting WEP, you can enable Shared Key Authentication (Forced) or allow the 5430 to send the key only when prompted by the wireless router (Open System).

The Network Key must be the same as the wireless router keys. If you have multiple network keys, you can enter up to four keys.

Note. When entering network keys, the register state is taken into account. Enter the exact network key that appears on your wireless router or access point.

Wireless MAC address filtering
MAC address filtering can only be used to connect to a specific wireless router or access point. You can add the MAC address of your wireless router or access point and change the Wireless MAC address filtering field to Allow. This will prevent the 5430 from communicating with the wireless router or access point only, and other devices will not be able to access it.

Advance Menu Options

Radio
Use the Radio menu to enable or disable wireless signal transmission. If you want to turn off the signal from the device (disconnect the device from the wireless network), select the option Radio off(Radio - off).

Channel
802.11b and 802.11g devices use channels to reduce the effects of interference from other devices. If the interference is caused by another 2.4GHz device such as a baby monitor, burglar alarm, or cordless phone, change channels on your 5430 and wireless router. The Channel function is mainly used in Ad Hoc mode. In Client mode, the 5430 automatically switches channel to match that of your wireless router or access point.

54g Mode
If you are having trouble connecting to an 802.11b wireless router only, try setting the 5430 to 802.11b only and follow the same steps for the wireless router. This will only establish a connection with the 802.11b device. Set to 54g Auto for compatibility with a variety of devices. Set to 54g Performance mode for the highest performance in any 54g certified hardware.

54g Protection
802.11g standards provide a method of protection in which 802.11g and 802.11b devices can simultaneously reside on the same network without accessing each other. Do not disable 54g Protection if there is a possibility that an 802.11b device will need to use your wireless network. In Auto mode, the wireless device uses RTS / CTS signals to improve the performance of the 802.11g device over combined 802.11g / 802.11b networks. Disable security to maximize the bandwidth of your 802.11g device in most cases.

54g + (Xpress)
54g + is a technology that uses standards-based frame enhancement to achieve higher throughput. When 54g + is enabled, the total throughput (the sum of the throughput speeds of each client on the network) can be increased by up to 25% in networks with a single 802.11g device and up to 75% in complex networks of 802.11g and 802.11b devices.

Rate
You can set a lower baud rate if the high speed has problems establishing a connection or data loss occurs. It is important to be aware that some data rates are specific to one 802.11 standard, while another will only allow the 5430 to connect to that network. 802.11g speeds: 6, 9, 12, 18, 24, 36, 48, 54 Mbps; 802.11b speeds: 1, 2, 5.5, 11 Mbps

Basic Rate Set
You can choose between two options: support all rates, as described in the Rate section above, or use 1.2 Mbps, which is only supported by older versions of 802.11b.

Fragmentation Threshold
This threshold is used for packet fragmentation, which can improve performance when an RF radio interface is available.

RTS Threshold
The RTS threshold determines the size of the transmission packet and, using the access point, helps control the traffic flow.

DTIM Interval
DTIM Interval sets the startup interval for clients in power save mode.

Beacon Interval
A beacon is a packet of information indicating the readiness of a connected device, sent from that device to all other devices. The beacon interval is the amount of time (set by the beacon) before the beacon is re-sent. The beacon interval can be configured in the range of milliseconds (ms).

Preamble Type
Preambles are a sequence of binary bits that help synchronize receivers and prepare the reception of transmitted data. Some older versions of wireless systems, such as 802.11b, use shorter preambles. If you have any problems connecting to an older 802.11b device, try using a shorter preamble. A short preamble can be used if the 54g Mode field for 54g mode is 802.11b Only.

Switching Between Client and Ad Hoc Mode

To switch between Client and Ad Hoc modes, simply access the Web User Interface, select Setup(Installation) and follow the instructions on the screen as shown in the figure below:

Alternatively, you can switch between modes as follows: select the Wireless tab, select the desired mode in the Wireless Mode field and click Apply(Apply).

Adapter upgrade

Download and place the firmware file in a local directory. Set the 5430 to Config Mode (use a pin or paper clip to press the reset button for a maximum of 2 seconds). Connect an Ethernet cable to the Ethernet port on your computer and use a different IP address (for more information, see Accessing the 5430 Web User Interface in the User's Guide). Launch an Internet browser and enter http://192.168.1.201 in the address bar. Enter your username to access the Web User Interface (default is admin) and password (by default - admin). Select a tab Tools(Service). In the New Firmware line, select Browse(Browse) and navigate to the location of the downloaded firmware file. Please select Upgrade(Refresh) to start the upgrade. Never disconnect the cable or interrupt the update process. Wait a few seconds for the adapter to reboot after the update.

Tools Menu Options

The Site Survey function will search for all networks (SSIDs) in the adapter's coverage area and select one network to communicate. If encryption is used for the selected network, you must first set encryption on the 5430 using the Security tab (see the documentation for your wireless router or access point for specific information on securing your network).

Use the Tools menu to change the login account for the 5430, change the IP address and subnet mask for managing the 5430, and restore the 5430 to factory defaults.

Wi-Fi parameters cheat sheet

  • Rate
    You can set a lower baud rate if the high speed has problems establishing a connection or data loss occurs. It is important to be aware that some data rates are specific to one 802.11 standard, while another will only allow the 5430 to connect to that network. 802.11g speeds: 6, 9, 12, 18, 24, 36, 48, 54 Mbps; 802.11b speeds: 1, 2, 5.5, 11 Mbps
  • Basic Rate Set
    You can choose between two options: support all rates, as described in the Rate section above, or use 1.2 Mbps, which is only supported by older versions of 802.11b.
  • Fragmentation Threshold
    This threshold is used for packet fragmentation, which can improve performance when an RF radio interface is available.
  • RTS Threshold
    The RTS threshold determines the size of the transmission packet and, using the access point, helps control the traffic flow.
  • DTIM Interval
    DTIM Interval sets the startup interval for clients in power save mode.
  • Beacon Interval
    A beacon is a packet of information indicating the readiness of a connected device, sent from that device to all other devices. The beacon interval is the amount of time (set by the beacon) before the beacon is re-sent. The beacon interval can be configured in the range of milliseconds (ms).
  • Preamble Type
    Preambles are a sequence of binary bits that help synchronize receivers and prepare the reception of transmitted data. Some older versions of wireless systems, such as 802.11b, use shorter preambles. If you have any problems connecting to an older 802.11b device, try using a shorter preamble. A short preamble can be used if the 54g Mode field for 54g mode is 802.11b Only.
  • Beacon Interval
    Beacons are packets sent by an access point to synchronize a wireless network. Specify the desired interval for sending Beacons. The default is 100 (recommended).
  • DTIM interval (DTIM, Traffic delivery notification)
    The default Delivery Traffic Indication Message is 3. DTIM is a countdown counter that notifies next window clients to listen to broadcast and multicast messages.
  • Fragment Length
    The fragmentation threshold, specified in bytes, determines which packets will be fragmented. Packets larger than 2346 bytes will be fragmented before transmission, since the default is 2346.
  • RTS Length
    This parameter should remain equal to the default value of 2346. If you are faced with a corrupted data stream, it is recommended only to decrease the RTS threshold value in the range from 256 to 2346.

The desire to view iptv via wi-fi arose simultaneously with the purchase of a laptop. Since my provider broadcasts an uncoded signal, there was no need for a set-top box, and to realize the desire, only a router capable of "showing" iptv was required. After a short torment, the choice fell on the ZyXEL nbg460n, which was supposed to satisfy all the needs that arose, while I, an inexperienced person in these matters, assumed that iptv would be distributed by itself and via wi-fi, but just with this a problem arose.

No matter how good ZyXEL is, he stubbornly did not want to distribute the TV over the air. Re-flashing the device and tinkering with the settings did not help, only a small stub of a picture stubbornly came to the beech, which immediately froze with a plaintive sob, after which the wireless television ended before restarting the player. Since the zyuh was infallible by definition, the thought came to my mind that the transmitted stream was too fat and could not be pumped over wi-fi.

I always believed that if the specification of a router says 300Mbit, it means that it should work for all 300, well, in extreme cases, no less than 250, but in fact it was oh so far to this figure. It turned out that the speed indicated by the manufacturers of wireless wi-fi equipment in the characteristics is not the data transfer speed. This is only the so-called "radio speed", while the file transfer rate should be at most half that.

In order to fully unleash the potential of the 802.11n standard, the specifications of which indicate a radio speed of 300 Mbps (respectively, 150 Mbps data transfer rate), special equipment is required, only routers and receivers, which have three antennas, and also support operation at a frequency of 5 GHz and MIMO technology, are theoretically capable of approaching the 150 Mit / s mark. At the same time, most of the equipment that supports 802.11n operates only at 2.4 GHz (like my ZyXEL), which is guaranteed to "cut" the theoretical maximum data transfer rate to only 75 Mbps. But even in spite of all these restrictions, iptv, with the most excellent picture, cannot consume more than 5 Mbps, i.e. can show perfectly even on the 802.11g standard.

The equipment turned out to be in perfect order, further study of the issue opened the eye on the problem of IP wifi even wider and brought disappointment in the 460th. As it turned out, iptv over cable and over the air are two big differences, and that it is the router that makes the truly wireless television in my case, and the ZyXEL nbg460n did not know how.

In order to find the best option, all acquaintances potentially having access to a router were interviewed, and after a while a small collection of routers gathered in the house. After conducting a series of tests, I realized that none of the presented models is capable of broadcasting iptv wirelessly in any quality that satisfies me, while DLink Dir-615 turned out to be the most worthy in this regard, through which television was shown quite acceptable, provided that the laptop was within a radius of 3 meters from the router, at longer distances lags began, artifacts spilled out and the picture periodically froze.

It's time to go to the forums again, and lo and behold, almost the first link led me, if not to a solution to the problem, then in any case showed that there is life on Mars, watching iptv via wi-fi is possible, and even there are people who are so easy, you live well, every day they watch it and do not even see anything special in it, which for me, a person who had lost faith in modern technologies, was a real magic.

The solution was found. It consisted in the need to convert udp-multicast iptv traffic to tcp-unicast. This can be done using a special UDP-to-HTTP utility that will carry out all the necessary evolutions. At the same time, the picture and sound becomes very high quality, you will not see any artifacts, lags and fading, viewing becomes extremely comfortable, and not only on a laptop, but also on all devices morally ready for this, such as Xbox, Playstation, WD TV Live or even a TV with DLNA support. Of course, the utility must be run on a computer with iptv connected to it via a twisted pair, i.e. if you use an always-on home server, then this is an option that will work with any router that understands iptv, but if a constantly-on computer is not included in your plans, then you can purchase a router that can perform traffic conversion (with udpxy support). In this case, traffic conversion will be carried out directly on the router.

The most famous manufacturers producing routers with udpxy support are LinkSys, ASUS and the notorious ZyXEL with the Keenetic series. I can't say anything about NetGear, someone seemed to write that he succeeded, but there is no reliable information. Some LinkSys and ASUS models will have to be changed with custom firmware (for example, DD-WRT) to achieve what you want, and ZyXEL can do this right out of the box. I settled on ASUS RT-N56U, which also regularly blows IPTV UDP Multicast in the HTTP Proxy port, and also knows how to distribute content via UPnP, which facilitates, for example, wireless viewing of video files on the corresponding TV models.

That's all. If someone has technical questions about setting up, then just go to the search with a couple of technical terms from the article and the word udpxy.

P.S. Everyone who bought ASUS RT-N56U highly recommend custom firmware from Padavan, which can be downloaded


Let's finally talk about agricultural implements in wireless networks. After all, this interesting topic is so rarely discussed! But inexperienced users on the way of setting up Wi-Fi connections are trapped by just a lot of insidious "rakes". Careful, don't step on!

Alien experience. Or alien?

What do inexperienced users do to improve their experience before setting up a Wi-Fi network? Of course, they wander around the nooks and crannies of the Internet, in search of the necessary bits of knowledge. Alas, along with knowledge, the modern Internet offers us many myths, fairy tales, phantasmagorias and other legends of "folk art". The power of the internet is freedom of speech. And this is his weakness: now you can express your opinion about the nature of the Higgs bosons simply by putting aside the Primer for a minute ...

Therefore, always remember what the great grandfather Einstein taught: "everything is relative and depends on the point of view of the observer." Be guided by the principle of "trust but verify", and you will not go wrong. After all, what is the only correct setting in relation to the configuration of your equipment can only be set by you yourself, having checked the operation of this or that function in practice. Keep in mind that even the so-called "conventional" or "public" opinion can be wrong. This is exactly what was once the case with the notorious incident with QoS, which allegedly "consumed" 20% of the bandwidth of a computer network. And which all together rushed to turn off, because one "great expert" from the Internet completely misunderstood the Microsoft developers, and those, as usual, "did not have time to explain." And a bunch of man-hours of labor was wasted by different (and even very smart) people on absolutely vain poking around in network settings. Frankly, your humble servant sinned with QoS in his youth. It was a great time! ..

So, let's quickly banish the nostalgia! After all, we are generally in the other direction: we are running on a wireless rake.

Rowing Safely: Lots of Settings ... Not Needed.

I remember in an article about sharing Wi-Fi from a TV, I supported LG in its approach to network security. All user options for security settings were limited to a single password change option! Both on gagadget itself and on the sites "pioneering" this article, there were certainly wizards of fine tuning security, angrily condemning this approach. You see, give them a variety of settings! Apparently deep down, somewhere very deeply, these people feel like great guru-teachers of safety Zen. But the nirvana of avid tuners is bursting with the harsh reality of the real world ...

What security settings does a Wi-Fi network offer us? It builds security in accordance with the WEP, WPA and WPA2 standards using the TKIP and AES encryption algorithms.

WPA standards have a simple mode, aka WPA-Personal, aka Pre-Shared Key (WPA-PSK) and an advanced authentication mode, aka WPA-Enterprise.

Let's run over them, maneuvering between the rakes. You can use WEP (Wired Equivalent Privacy) only if you want to give your neighborhood boys a real chance to try their hand at hacking wireless networks. If they are talented, they can do it in a matter of minutes. If you are very lazy, they can handle it in a day, with a lunch break. I think that 99.99999% of users are not satisfied with this type of network security today, except for those rare eccentrics who write comments, postponing the Primer.

WPA (Wi-Fi Protected Access) is stronger in terms of security. IEEE 802.11i uses the Temporal Key Integrity Protocol (TKIP) when using WPA secure wireless access. It sounds so great! And the network would be locked, if you do not take into account the "but". The first "but" sounded back in 2008, when smart people proposed a way to crack the TKIP key in a few minutes, which made it possible to intercept data on the network. And in 2009, the Japanese were doing some unknown thing at the university, and found a way to guarantee WPA networks hacking. WPA, come on bye!

The Wi-Fi security picture would be completely bleak if for almost ten years the support of the WPA2 secure wireless access protocol, which uses the Advanced Encryption Standard (AES) encryption algorithm, was not a prerequisite for certification of any Wi-Fi devices. It is thanks to the unique combination of WPA2 + AES that a modern wireless network can be reliably protected. If the user doesn’t poop, sorry, for her safety.

As for the WPA-Personal and WPA-Enterprise modes. If the first is limited by a password, then the second requires a database of registered users to check access rights to the network, and this database must be stored on a special server. Well, for home use or an ordinary office, using WPA-Enterprise is expensive, impractical and completely useless. And therefore no one needs it. Moreover, even in industrial enterprises, the WPA-Enterprise mode is rarely used, because all these additional complications / costs are unnecessary there. In defense of WPA-Enterprise, I can only say one thing - it is a very reliable thing.

Thus, WPA-Personal mode, WPA2 secure access and AES encryption ((WPA-PSK) + WPA2 + AES) are all the user needs to know about the wireless security settings. There is simply no other adequate option. This is the default option that LG offered on its TV, for which I praised it. All other variations of the settings are from the crafty one. Whose unhealthy interest is being satisfied by wireless equipment manufacturers by offering long-unnecessary and outdated configuration options in modern Wi-Fi devices, I don't know. Targeting those who have already mastered the ABC book, but still feel insecure at the sight of the multiplication table? Maybe.

Oh yes! After all, there is also a "popular" mode of Wi-Fi network operation without any protection at all! And every second wireless equipment reviewer will not fail to mention: this, guys, is the desired ideal - the highest Wi-Fi performance mode! And any kind of encryption there only slows down the communication speed. Oh, is it?

Safety without brakes.

So we have to sacrifice security to get the fastest network speeds? But this is somehow very similar to a rake, even at first glance. Such statements seem to have a rationale: after all, additional time is required to encrypt / decrypt the signal during transmission. However, this would be true in an ideal world. Our world is unfair. Its grim realities are such that the data transfer rate over the wireless network is so low (perhaps, in the 802.11ac network, the alignment is different, until I have the opportunity to verify this, but everything said is absolutely true for 802.11 b / g / n networks) that the processor copes well with encryption almost in the background. Therefore, the speed of the Wi-Fi network with adequately configured encryption ((WPA-PSK) + WPA2 + AES) does not decrease compared to the mode without encryption. Ask any network equipment manufacturer about this, he will confirm it to you. Or you can just check on your router and see for yourself. However, with other security settings, the network speed may drop (details a little later). Therefore, make sure that the network settings on all equipment are correct and that any subtle rakes in one place do not lead to a decrease in the data transfer rate of the entire network. Well, actually let's move on to speed.

On a rake at a speed

There is another myth widespread among reviewers - allegedly the wireless network "slows down", operating at the speed of the slowest Wi-Fi device connected. Nothing like this! Wi-Fi developers didn't fall from the oak tree! And even if they did fall, it was not high. Therefore, a router or access point communicates with each wireless device individually and at the maximum speed available to it, of course, within the speed limits of the network being used. So, when using mixed mode 802.11g / n, devices that support network speed n will not drop the speed to the g standard. The wireless speed will only decrease when communicating with g-standard devices. You just need to understand that the more such slow devices there are in the wireless network and the more traffic they have, the slower the wireless network as a whole will work. Therefore, manufacturers do not recommend using any mixed modes there and will limit themselves to the choice of the 802.11n standard for a modern network. An exception is when the household has old but dear devices that are incompatible with the 802.11n standard. For example, laptops. However, for them it is quite possible to buy some inexpensive Wi-Fi adapter with support for the n standard and not deny yourself the speed of wireless surfing.

The hottest heads, in a fit of enthusiasm, are advised to immediately turn off any "saving modes" and put the router, access point or network card into the maximum transmission power mode - to increase the speed.

However, this will not lead to any noticeable result, except for additional heating of the device. An attempt to detect an increase in the network speed with an increase in the transmission power of a router or network adapter within the confines of my modest apartment was unsuccessful - the network worked at the same speed regardless of the radio communication power. Of course, if you have a large private house, the advice may turn out to be useful - for stable communication in the farthest rooms, it is really advisable to increase the signal strength. Residents of ordinary city apartments do not need maximum Wi-Fi power, it will only interfere with neighboring networks. In addition, wireless devices located near a router or access point at maximum transmission power may work even less stable and fast than at lower power. Therefore, always start with

and there already look according to the situation.

Incorrect network security settings can negatively affect the speed! For some reason, even the writers of manuals for routers, not to mention reviewers, when choosing a security setting, recommend choosing TKIP + AES encryption. However, if you set up and use the TKIP encryption mode in a mixed mode network, then the speed of the entire network will automatically drop to 802.11 g, since such an outdated type of encryption is simply not supported by 802.11n networks. Do you need it? Compare:

The bandwidth of the wireless WPA-PSK network in the AES encryption mode, reveals the full potential of 802.11n (about 13.5 Mb / s):

And the bandwidth of the same wireless network when using TKIP encryption (about 2.8 MB / s):

Have you compared? Now forget about this TKIP altogether! This is just a terrible old rake.

If anyone is interested, the network bandwidth in both cases was measured when transferring the same file (iso disk image) of 485.5 MB in size between the only transmitter (router) and the only receiver (laptop Wi-Fi card) in the wireless network.

Acceleration with brakes

Perhaps I will not talk about the long and short preamble and other nonsense that has remained in the settings of network equipment since prehistoric times - this has lost its relevance even with the arrival of the Wi-Fi 802.11g standard, when the long preambles went into eternal rest. But, nevertheless, some interesting "goodies" of accelerating Wi-Fi have been preserved since then. This is, for example, the ability to use Short GI. What the…?

Let me explain. Wi-Fi equipment uses the so-called Guard Interval. This is the blank time between successively transmitted wireless characters (usually hexadecimal). The interval is of great practical importance - it is used to reduce the level of errors in wireless data transmission. The standard Guard Interval has a duration of 800ns. It is assumed that in 800ns the sent radio signal is guaranteed to reach the receiving device, taking into account all possible delays, and the next character can be sent.

Well, "Wi-Fi overclockers" offer to reduce the guard interval. Short GI means Guard Interval halved to 400ns. In theory, according to the calculations of British scientists, this should increase the speed of the wireless network by about 10% or more. Excellent! And it seems like within a small network of "pitfalls" for fast waves Wi-Fi should not be with Short GI. I once fell for it too. For about a year my router worked with Short GI, until one fine moment I decided to measure the performance gain from this "enhancer". Measured it. And I almost bit off my elbows!

No, it’s not even sadness, it’s generally some kind of sadness! The network speed with the Short GI parameter turned out to be two times lower than with the normal Guard Interval. Why did it happen? Because in the conditions of oversaturated radio air with neighboring networks, the number of reception / transmission errors with the reduction of Guard Interval has increased significantly! Alas, by cutting the error reduction interval in real conditions, you can achieve not an increase, but, on the contrary, a decrease in the performance of a wireless network. That's a rake with a surprise! This once again confirms the axiom: if he uses another network "accelerator", always check the result!

Freedom to channels!

The lion's share of the writers of advice on speeding up Wi-Fi recommend by all means "manually" looking for the least loaded frequency radio channels and forcibly registering them in the router settings for their network. For some reason, they completely forget that a modern router itself is able to select the least loaded channels when initializing the network and start working on them. If, however, to prescribe channels forcibly, then a situation is possible, as in the tale of two rams on the bridge. For example, when one tuner "registered" the channels, the neighbor's router did not work, and vice versa. As a result, an option arises when the closest neighboring networks, according to the results of "manual" settings, end up on the same channels. And since the settings are rigidly set by the user, the router itself is no longer able to change anything and works hard at busy frequencies. As a result, neighboring networks that use a wide (40 MHz) range for wireless communication actively interfere with each other, and users spit from poor communication quality.

Wi-Fi routers catalog.

In order to configure the configuration of the connection of wireless clients, you need to go to the next page of the web configuration manager

Menu items:

Disable (requires no information)

Accept (requires information to be entered)

Reject (requires information to be entered)

For security purposes, ASUS 802.11g AP allows you to allow or block the connection of some wireless clients.

The default setting "Disable" allows any client to connect. "Accept" allows only clients entered on this page to connect. "Reject" is blocking the connection of clients entered on this page.

Adding MAC addresses

The list of known clients contains the MAC addresses of clients connected to the AP. To add a MAC address to the ACL, simply select a MAC address from the list, then click the "Soru" button.

RADIUS CONFIGURATION


In this section, you can set additional parameters for connecting to the RADIUS server. This is required when you select the "WPA-Enterprise / WPA2-Enterprise" or "Radius with 802.11x" authentication method on the page Wireless -> Interface.

Server IP Address- This field specifies the IP address of the RADIUS server for using 802.11X authentication and dynamic verification of WEP keys.

Server Port- This field specifies the UDP port number used by the RADIUS server.

Connection secret- This field specifies the password for connecting to the RADIUS server.

Note: Click "Finish" to save the settings and reboot ASUS 802.11g AP, or click "Save" to save.

GUEST ACCOUNT

In this section, you can create a guest account for wireless access. Select Yes in the Enable Guest Account field.

ADDITIONALLY

In this section, you can set advanced parameters for wireless functions. Default values ​​are recommended for all items in this window.
In this window you can also set the operating mode (AP, Adapter, or Repeater).

Enable AfterBurner- In this field you can enable AfterBurner mode for faster data transfer. AfterBurner mode requires the authentication method to be set to Open System and the mode to AP.

Hide SSID- "No" is the default option, so wireless clients can see your ASUS 802.11g AP SSID and connect to the AP. If you select "Yes", your ASUS 802.11g AP will not be shown to wireless clients and you need to manually enter your ASUS 802.11g AP SSID to connect. Select "Yes" to restrict access to your ASUS 802.11g AP. For security purposes, please change the SSID to something else.

Set AP Isolated- Select Yes to prevent wireless clients from communicating with each other.

Data Rate (Mbps)- In this field you can specify the baud rate. Leave "Auto" for maximum performance.

Basic Rate Set- This field specifies the base rate supported by wireless clients. Use "1 & 2 Mbps" only for backward compatibility with older clients.

Fragmentation Threshold (256-2346)- Fragmentation is used to split 802.11 frames into smaller chunks (chunks) that are sent separately. Enable fragmentation by setting a specific threshold for packet size. If the WLAN is experiencing an excessive number of collisions, experiment with different fragmentation values ​​to increase the reliability of frame transmission. For general use, it is recommended to set the default value (2346).

RTS Threshold (0-2347)- The RTS / CTS (RTS - Request to Send / VNR - Tolerance to Send) function is used to minimize mutual interference between wireless stations. When the RTS / CTS function is enabled, the router refrains from sending data until it responds with an RTS / CTS. Enable RTS / CTS function by setting a certain threshold for packet size. It is recommended to set the default value (2347).

DTIM Interval (1-255)- DTIM (Delivery Traffic Message) message used to inform users in power save mode to wake up the system to receive broadcast or multicast messages. Enter the DTIM interval for clients in power save mode. The default value (Z) is recommended.

Beacon Interval (1-65535)-This field specifies the time interval in milliseconds after which the system sends a message about the readiness of the connected device. The default value (100 milliseconds) is recommended.

Enable Frame Bursting- In this field you can enable frame-bursting mode for faster data transfer to clients that support frame-bursting.

Radio power- The output power can be set from 1 to 84, but the default is recommended.

Enable WMM- In this field you can enable WMM for faster media transfer

Enable WMM No-Acknowledgment- In this field you can enable WMM No-Acknowledgment

Mode- In this field you can set the mode of operation in AP or repeater.

When set to repeater mode, you should set the parameters for the repeater:

Enable Individual Wireless Setting- Selecting "Yes" applies to the repeater the parameters set on this page. Selecting "No" applies the parameters set to Wireless -> Interface Repeater to the repeater.
Other security settings are the same as on Wireless -> Interface.

New on the site

>

Most popular