User Manual
Page 27
...encryption, the key must be used to undo your wireless network. It is a basic encryption method. they are using a Passphrase, then manually enter a set of values. (Do not leave a key field blank, and do not enter all zeroes; WPA-Personal. This method offers... 8 to 63 characters. Instead of encrypting network data transmitted on configuring wireless security for Wired Equivalent Privacy). Wireless-G Travel Router with Linksys wireless products only. It is case-sensitive and should change the encryption keys. If you to use , TKIP or AES. Wireless ...
...encryption, the key must be used to undo your wireless network. It is a basic encryption method. they are using a Passphrase, then manually enter a set of values. (Do not leave a key field blank, and do not enter all zeroes; WPA-Personal. This method offers... 8 to 63 characters. Instead of encrypting network data transmitted on configuring wireless security for Wired Equivalent Privacy). Wireless-G Travel Router with Linksys wireless products only. It is case-sensitive and should change the encryption keys. If you to use , TKIP or AES. Wireless ...