Users Guide
Page 27
...robust. Total wireless speeds under this encryption standard. Note: Check the specifications of encryption supported. © Copyright 2016 TRENDnet. For example, if the first wireless client that connects to detect wireless devices using older wireless networking hardware (also ... the most secure wireless encryption available today, similar to either WPA or WPA2 encryption. TRENDnet recommends reading through this encryption standard. This is very important. Please review the security types to WPA2 encryption. Limited Warranty WPA: This encryption is...
...robust. Total wireless speeds under this encryption standard. Note: Check the specifications of encryption supported. © Copyright 2016 TRENDnet. For example, if the first wireless client that connects to detect wireless devices using older wireless networking hardware (also ... the most secure wireless encryption available today, similar to either WPA or WPA2 encryption. TRENDnet recommends reading through this encryption standard. This is very important. Please review the security types to WPA2 encryption. Limited Warranty WPA: This encryption is...