beautypg.com

Access control, Wireless security, Procedure (see – RCA SpeedTouch 580 User Manual

Page 21: Chapter 3

background image

Chapter 3

Internet Access in No Time

E-DOC-CTC-20050126-0005 v1.0

19

Access Control

To protect your SpeedTouch™ from unauthorized access, you must provide a user
name and password. Each time a user wants to access the SpeedTouch™ web
interface, the user will be prompted to provide this user name and password before
access is granted.

Wireless security

To protect the wireless connections to your SpeedTouch™, move the slide control to
the desired security mode.

Following security modes to secure traffic between the SpeedTouch™ and connected
wireless stations are available:

Low

, which implies in fact that no security measures are taken at all

Medium

, implying that traffic is encrypted by means of a static encryption key

(WEP).

High

, providing the highest security available (WPA) for securing all wireless

traffic.

For an overview on all SpeedTouch™ wireless security features, see

“ Securing your

wireless network” on page 28

.