{"id":43855,"date":"2024-03-28T07:48:41","date_gmt":"2024-03-28T06:48:41","guid":{"rendered":"https:\/\/kb.apptec360.com\/manual\/knowledgebase\/wi-fi\/"},"modified":"2024-12-04T05:01:23","modified_gmt":"2024-12-04T04:01:23","slug":"wi-fi","status":"publish","type":"knowledgebase","link":"https:\/\/kb.apptec360.com\/manual\/pl\/knowledgebase\/macos-configuration\/connection-management\/wi-fi\/","title":{"rendered":"Wi-Fi"},"content":{"rendered":"\n<p>Tutaj mo\u017cna dodawa\u0107 i konfigurowa\u0107 po\u0142\u0105czenia Wi-Fi<\/p>\n\n<table id=\"tablepress-350\" class=\"tablepress tablepress-id-350\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=350\" rel=\"nofollow\">Edytuj<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Identyfikator zestawu us\u0142ug (SSID)<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>SSID sieci, z kt\u00f3r\u0105 zostanie nawi\u0105zane po\u0142\u0105czenie<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Automatyczne do\u0142\u0105czanie<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>W\u0142\u0105cz automatyczne do\u0142\u0105czanie do sieci<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Ukryta sie\u0107<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>W\u0142\u0105cz, je\u015bli punkt dost\u0119powy nie rozg\u0142asza identyfikatora SSID.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Konfiguracja proxy<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Konfiguracja serwera proxy dla ka\u017cdego punktu dost\u0119powego<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Brak<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Nie u\u017cywaj serwera proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Podr\u0119cznik<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Ustanowienie r\u0119cznego pe\u0142nomocnika<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Adres URL serwera proxy<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Adres dost\u0119pu do ustawie\u0144 serwera proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Port<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Ustalenie portu dla serwera proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Uwierzytelnianie<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Nazwa u\u017cytkownika do uwierzytelniania na serwerze proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Has\u0142o<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Has\u0142o do uwierzytelniania na serwerze proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Automatyczny<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Automatyczne ustanowienie serwera proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Adres URL serwera proxy<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Adres URL pliku ustawie\u0144 serwera proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-13 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Typ zabezpieczenia<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Ustalenie typu zabezpiecze\u0144 dla punktu dost\u0119powego<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-14 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>WEP<\/p><br\/>\n      <\/td><td class=\"column-2\"><\/td>\n<\/tr>\n<tr class=\"row-15 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Has\u0142o<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Has\u0142o do punktu dost\u0119powego<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-16 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>WPA\/WPA2<\/p><br\/>\n      <\/td><td class=\"column-2\"><\/td>\n<\/tr>\n<tr class=\"row-17 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Has\u0142o<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Has\u0142o do punktu dost\u0119powego<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-18 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>WEP Enterprise &#8211; WPA \/<\/p><br\/>\n        <p>WPA2 Enterprise \/<\/p><br\/>\n        <p>Dowolne przedsi\u0119biorstwo<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Zobacz b\u0142\u0105d tabeli: Nie znaleziono \u017ar\u00f3d\u0142a poni\u017cej<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-19 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Brak<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Brak zabezpiecze\u0144<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-20 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Wy\u0142\u0105czanie randomizacji adres\u00f3w MAC<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Wy\u0142\u0105cza randomizacj\u0119 adres\u00f3w MAC dla tej sieci Wi-Fi podczas powi\u0105zania z sieci\u0105. Powoduje to r\u00f3wnie\u017c wy\u015bwietlenie ostrze\u017cenia o prywatno\u015bci w Ustawieniach, wskazuj\u0105cego, \u017ce sie\u0107 ma ograniczon\u0105 ochron\u0119 prywatno\u015bci. <\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"parent":43856,"menu_order":0,"template":"","class_list":["post-43855","knowledgebase","type-knowledgebase","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase\/43855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase"}],"about":[{"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/types\/knowledgebase"}],"version-history":[{"count":2,"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase\/43855\/revisions"}],"predecessor-version":[{"id":47165,"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase\/43855\/revisions\/47165"}],"up":[{"embeddable":true,"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase\/43856"}],"wp:attachment":[{"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/media?parent=43855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}