Netgear WGR614v9 WGR614v9 User Manual - Page 28

Recording Basic Wireless Settings Setup Information, Wireless Network Name SSID, WEP Authentication - for windows 7

Page 28 highlights

Wireless-G Router WGR614v9 Reference Manual Table 2-2. Other Features That Enhance Security Security Type Restrict access based on MAC address. Modify your firewall's rules. Description You can restrict access to only trusted computers so that unknown computers cannot wirelessly connect to the Wireless-G Router. MAC address filtering adds an obstacle against unwanted access to your network by the general public, but the data broadcast over the wireless link is fully exposed. This data includes your trusted MAC addresses, which can be read and impersonated by a hacker. For more information, see "Restricting Wireless Access by MAC Address" on page 2-11. By default, the firewall allows any outbound traffic and prohibits any inbound traffic except for responses to your outbound traffic. However, you can modify the firewall's rules. For more information, see "Understanding Your Firewall" on page 2-15. Recording Basic Wireless Settings Setup Information Before customizing your wireless settings, print this section, and record the following information. If you are working with an existing wireless network, the person who set up or is responsible for the network can provide this information. Otherwise, you must choose the settings for your wireless network. Either way, record the settings for your wireless network in the spaces provided. • Wireless Network Name (SSID The SSID identifies the wireless network. You can use up to 32 alphanumeric characters. The SSID is casesensitive. The SSID in the wireless adapter card must match the SSID of the wireless router. In some configuration utilities (such as in Windows XP), the term "wireless network name" is used instead of SSID. • If WEP Authentication is used, circle one: Open System, Shared Key, or Auto. Note: If you select Shared Key, the other devices in the network will not connect unless they are also set to Shared Key and are configured with the correct key. - WEP Encryption Key Size. Choose one: 64-bit or 128-bit. Again, the encryption key size must be the same for the wireless adapters and the wireless router. 2-4 Safeguarding Your Network v1.1, May 2008

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116

Wireless-G Router WGR614v9 Reference Manual
2-4
Safeguarding Your Network
v1.1, May 2008
Recording Basic Wireless Settings Setup Information
Before customizing your wireless settings, print this section, and record the following information.
If you are working with an existing wireless network, the person who set up or is responsible for
the network can provide this information. Otherwise, you must choose the settings for your
wireless network. Either way, record the settings for your wireless network in the spaces provided.
Wireless Network Name (SSID)
.
______________________________
The SSID identifies
the wireless network. You can use up to 32 alphanumeric characters. The SSID
is
case-
sensitive. The SSID in the wireless adapter card must match the SSID of the wireless router. In
some configuration utilities (such as in Windows XP), the term “wireless network name” is
used instead of SSID.
If
WEP Authentication
is used, circle one:
Open System
,
Shared Key
,
or
Auto
.
WEP Encryption Key Size
. Choose one:
64-bit
or
128-bit
. Again, the encryption key
size must be the same for the wireless adapters and the wireless router.
Restrict access based on MAC address.
You can restrict access to only trusted computers so
that unknown computers cannot wirelessly connect
to the Wireless-G Router. MAC address filtering
adds an obstacle against unwanted access to your
network by the general public, but the data broadcast
over the wireless link is fully exposed. This data
includes your trusted MAC addresses, which can be
read and impersonated by a hacker.
For more information, see
“Restricting Wireless
Access by MAC Address” on page 2-11
.
Modify your firewall’s rules.
By default, the firewall allows any outbound traffic
and prohibits any inbound traffic except for
responses to your outbound traffic. However, you
can modify the firewall’s rules.
For more information, see
“Understanding Your
Firewall” on page 2-15
.
Note:
If you select Shared Key, the other devices in the network will not connect
unless they are also set to Shared Key and are configured with the correct key.
Table 2-2.
Other Features That Enhance Security
Security Type
Description