Wireless Connection

This product has not been verified for compatibility with all wireless LAN devices. Operation with all wireless LAN devices is not guaranteed.

Caution

Handling of wireless communication functions

This product is equipped with wireless communication functions.
Due to the radio laws and regulations regarding wireless communication in each country, there may be limitations on usage. Please check the radio laws and standards for the country it is being used in, and the radio laws and regulations based on which this product has been certified.

  1. The frequency used in this product is used in a number of devices such as microwave ovens. Before use, make sure there will be no effects from radio waves emitted from these devices.
  2. This product has received technical standards conformity certification as a radio station for low-power data communication system according to radio laws and regulations. Therefore a radio station license is not required when using this product. However, disassembling/modifying this product may be subjected to punishment according to applicable laws, so please do not disassemble or modify this product.
  3. Secure a distance of 20 cm or more between the antenna of the device and the human body in order to minimize the influence of electromagnetic wave exposure according to the radio wave protection guideline. Otherwise, the cardiac pace maker is subject to EMI, resulting in malfunction.
  4. The use of wireless devices may be restricted or prohibited in medical institutions and aircraft.
    Follow any instructions provided by each medical institution or airline company.

Wireless devices using the 2.4 GHz band

This product uses the 2.4 GHz band.
In the 2.4 GHz band, in addition to industrial, chemical, and medical devices such as microwave ovens, the following wireless stations are operated: wireless stations (with licenses required) for identifying mobile objects used in production lines at factories, specified low-power radio stations (with no licenses required), and amateur radio stations (with licenses required).

  1. Before using this device, confirm that no premises radio stations for mobile object identification, specified low-power radio stations, or amateur radio stations are operated in the vicinity.
  2. If harmful radio wave interference should occur from this device to a premises radio station for mobile object identification, immediately change the working frequency or stop transmitting radio waves and take measures to avoid interference (e.g., installing partitions).

Precautions for security

Precautions for security when using wireless LAN products

In the wireless LAN, radio waves are used for communication between devices, instead of network cables, which provides an advantage where devices can connect with each other freely via LAN. On the other hand, radio waves can reach all locations through barriers such as walls if they are within a certain range.

If security-related settings are not configured, the following problems may occur.
・ Interception of communications by third parties
・ Hacking of networks
・ Leakage of information such as personal information and card information
・ Impersonation and falsification of communication data
・ Destruction of systems and data

Basically, wireless LAN cards and access points have security mechanisms for addressing these problems; therefore, the possibility of the occurrence of such problems has decreased with the use of settings for the security of wireless LAN products.
It is recommended that you fully understand the problems that my occur if security settings are not configured and then configure the security settings on your own judgment and responsibility before using the product.


Precautions for Service Set Identifier (SSID) settings

When operating the product in access point mode, observe the following precautions for security protection.

    SSID
  1. Change the SSID from the factory default setting
  2. Make SSID meaningless as much as possible to prevent third parties from knowing users by analogy
    Encryption key
  1. Do not use words listed in dictionaries as much as possible
  2. Combine meaningless alphanumeric characters and symbols accordingly