Netgear WGR614v9 WGR614v9 User Manual - Page 26

Changing Wireless Security Settings on Wireless Networking Basics in Appendix B - slow

Page 26 highlights

Wireless-G Router WGR614v9 Reference Manual WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK encryption can consume more battery power on a notebook computer, and can cause significant performance degradation with a slow computer. Note: NETGEAR recommends that you change the administration password of your router. Default passwords are well known, and an intruder can use your administrator access to read or disable your security settings. For information about how to change the administrator password, see "Changing the Administrator Password" on page 2-14. Wireless data security options Range: up to 300 foot radius 1) Open system: easy but no security 2) MAC access list: no data security WGR614v9 3) WEP: security but some performance impact 4) WPA-PSK: strong security 5) WPA2-PSK: very strong security Note: Use these with other features that enhance security (Table 2-2 on page 2-3). Figure 2-1 The Wireless-G Router provides two screens for configuring the wireless settings: the basic Wireless Settings screen, which you access under Setup in the main menu (see "Changing Wireless Security Settings" on page 2-5), and the Advanced Wireless Settings screen, which you access under Advanced (see "Changing Wireless Security Settings" on page 2-5). Basic security options are listed in order of increasing effectiveness in Table 2-1 below. Other features that affect security are listed in Table 2-2 on page 2-3. For more details on wireless security methods, see the online document "Wireless Networking Basics" in Appendix B. 2-2 Safeguarding Your Network v1.1, May 2008

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116

Wireless-G Router WGR614v9 Reference Manual
2-2
Safeguarding Your Network
v1.1, May 2008
WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK
encryption can consume more battery power on a notebook computer, and can cause significant
performance degradation with a slow computer.
The Wireless-G Router provides two screens for configuring the wireless settings: the basic
Wireless Settings screen, which you access under Setup in the main menu (see
“Changing Wireless
Security Settings” on page 2-5
), and the Advanced Wireless Settings screen, which you access
under Advanced (see
“Changing Wireless Security Settings” on page 2-5
).
Basic security options are listed in order of increasing effectiveness in
Table 2-1
below. Other
features that affect security are listed in
Table 2-2 on page 2-3
. For more details on wireless
security methods, see the online document
“Wireless Networking Basics” in Appendix B
.
Note:
NETGEAR recommends that you change the administration password of your
router. Default passwords are well known, and an intruder can use your
administrator access to read or disable your security settings. For information
about how to change the administrator password, see
“Changing the Administrator
Password” on page 2-14
.
Figure 2-1
WGR614v9
1) Open system: easy but no security
2) MAC access list: no data security
3) WEP: security but some performance
impact
4) WPA-PSK: strong security
5) WPA2-PSK: very strong security
Wireless data
security options
Range: up to 300 foot radius
Note:
Use these with other features that enhance security (
Table 2-2 on page 2-3
).