Netgear DG834Gv3 DG834Gv3 Reference Manual - Page 36

Choosing WEP Authentication and Security Encryption Methods, Apply, Trusted Wireless Stations

Page 36 highlights

Reference Manual for the ADSL Modem Wireless Router DG834G You can copy and paste the MAC addresses from the modem router's Attached Devices menu into the MAC Address box of this menu. To do this, configure each wireless computer to obtain a wireless link to the modem router. The computer should then appear in the Attached Devices menu. Note: If you are configuring the modem router from a wireless computer whose MAC address is not in the Trusted Wireless Stations list, and you select Trusted Wireless Stations only, you will lose your wireless connection when you click Apply. You must then access the modem router from a wired computer to make any further changes. 6. Make sure the Turn Access Control On check box is selected, then click Apply. Now, only devices on this list will be allowed to wirelessly connect to the DG834G v3. This prevents unauthorized access to your network. Choosing WEP Authentication and Security Encryption Methods Figure 3-5 3-10 v1.0, January 2006 Wireless Configuration

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190

Reference Manual for the ADSL Modem Wireless Router DG834G
3-10
Wireless Configuration
v1.0, January 2006
You can copy and paste the MAC addresses from the modem router’s Attached Devices menu
into the MAC Address box of this menu. To do this, configure each wireless computer to
obtain a wireless link to the modem router. The computer should then appear in the Attached
Devices menu.
6.
Make sure the Turn Access Control On check box is selected, then click
Apply
.
Now, only devices on this list will be allowed to wirelessly connect to the DG834G v3. This
prevents unauthorized access to your network.
Choosing WEP Authentication and Security Encryption Methods
Note:
If you are configuring the modem router from a wireless computer whose
MAC address is not in the Trusted Wireless Stations list, and you select
Trusted Wireless Stations
only
, you will lose your wireless connection when
you click
Apply
. You must then access the modem router from a wired
computer to make any further changes.
Figure 3-5