Contec NZ2WL-US Manuel D’Utilisation
NZ2WL - xxx
iii
Supported Wireless Networking Standards
This product conforms with IEEE 802.11a and IEEE 802.11b/g.
It can be set to the channels corresponding to the countries listed below.
Standard
Channel*1
U.S.A.
(NZ2WL-US)
Europe
(NZ2WL-EU)
China (NZ2WL-
CN)
Korea
(NZ2WL-KR)
Taiwan (NZ2WL-
TW)
IEEE802.11a
36, 40, 44, 48,
149, 153, 157, 161,
165ch
36, 40, 44, 48ch
149, 153, 157, 161,
165ch
36, 40, 44,
149, 153, 157,
161ch
149, 153, 157, 161,
165ch
IEEE802.11b/g 1-11ch
1-13ch
1-13ch
1-13ch
1-11ch
*1 The channels of this product can be changed only among the same models.
Security Precautions
Wireless LAN uses radio waves instead of LAN cables to send and receive data between a computer and
a wireless access point, making it possible to freely establish a LAN connection within a range of the
radio waves.
However, radio waves can be received through obstacles, such as walls, when within the range.
Therefore, if security settings are not made, the following problems may occur.
a wireless access point, making it possible to freely establish a LAN connection within a range of the
radio waves.
However, radio waves can be received through obstacles, such as walls, when within the range.
Therefore, if security settings are not made, the following problems may occur.
Unauthorized viewing of data
An unauthorized third party can intercept the radio waves and view e-mail messages and
personal information, such as user ID and password or your credit card information.
personal information, such as user ID and password or your credit card information.
Unauthorized access
An unauthorized third party can access a personal or corporate network and cause the
following damage:
following damage:
- Intercepting personal information and confidential information (information leak)
- Using a false identity to communicate and disclose information illegally (identity theft)
- Changing and transmitting intercepted data (tampering)
- Damaging data and systems by spreading a computer virus (destruction)
- Using a false identity to communicate and disclose information illegally (identity theft)
- Changing and transmitting intercepted data (tampering)
- Damaging data and systems by spreading a computer virus (destruction)
The wireless LAN card and wireless access point have security features to counter these problems.
Using the security settings of the wireless LAN equipment can help prevent these problems from
occurring.
The security settings of the wireless LAN equipment are not configured at the time of purchase.
To reduce security problems, configure all security settings of the wireless LAN equipment according to
the manual before using the wireless LAN card and wireless access point.
Please be aware that the security settings do not provide complete security protection due to wireless
LAN specifications. If you are unable to configure the security settings yourself, please contact your
local authorized dealer.
The customer is responsible for configuring the security settings and understanding the risks inherent in
using the product without the security settings configured.