8
E. If the access point is protected by encryption method, you have to input its security or passphrase
here. It must match the encryption setting on the access point.
F. If you can see this image, the connection between your computer and wireless access point is
successfully established. Click ‘Close’ to start network connection.