Tp link 802.11n wireless network security connected to the encrypted network through TP-LINK management tools:
Step 1: TP-LINK management tool main program in the supporting Nic drive disc, we can run the installation wizard.
Step 2: Select "Install client utility and driver" in the installation type, and click "Next" to continue.
Step 3 connecting to the encrypted network: By default, the wireless client configuration work is done by the XP system, so during the installation process we also have to choose to hand over this feature to the TP-LINK wireless 11n device application.
Step 4 connecting to the encrypted network: Install drivers and management programs. The system must copy files to the local hard disk.
Step 5 connecting to the encrypted network: After the installation is complete, start the management tool through "start-> program.
Step 6 connecting to the encrypted network: To connect to an encrypted wireless network, you need to switch to the "configuration file management" tab in the management tool and click "new.
Step 7: Enter the configuration file name, client name, and network SSID information.
Step 8 connecting to the encrypted network: Switch to the "Security" label. In this label, we can set connection parameters for various encryption methods, including WPA and WEP. Pre-shared key static WEP) corresponds to the previously mentioned WEP encryption method. Select the pre-shared key and click "Configure" to enter the key information.
Step 9 connecting to the encrypted network: If you want to connect to the WPA network, select WPA/WPA2 PSK and click "Configure" to enter the corresponding key information.
Step 10: The management tool also supports connection to the 802.1x type, which is the previously mentioned RADIUS method.
Have you learned how tp link 802.11n wireless network security devices connect to the encrypted network through management tools? We hope that readers can encrypt their networks as soon as possible, so that our wireless transmission is more secure and their privacy information can be stolen by illegal users.