It creates a secondary wireless network very easily configurable via its web browser interface by manufacturer for this purpose. The procedure is described in the operating instructions as. You can resume its box security settings.
The 2 boxes contain a socket to avoid condemning a power outlet with this device and this without affecting the data flow.