Netgear DG834PN DG834PN Reference Manual - Page 37

Authentication Type Selection, Encryption Choices, Preparing a Computer for Network - troubleshoot

Page 37 highlights

Reference Manual for the DG834PN RangeMaxTM ADSL Modem Wireless Router Restricting wireless access prevents intruders from connecting to your network. However, the wireless data transmissions are still vulnerable to snooping. Using the WEP data encryption settings described below will prevent a determined intruder from eavesdropping on your wireless data communications. Also, if you are using the Internet for such activities as purchases or banking, those Internet sites use another level of highly secure encryption called SSL. You can tell if a web site is using SSL because the web address begins with HTTPS rather than HTTP. Authentication Type Selection The DG834PN lets you select the following wireless authentication schemes. • Automatic • Open System • Shared key Note: The authentication scheme is separate from the data encryption. You can choose an authentication scheme which requires a shared key but still leave the data transmissions unencrypted. If you require strong security, use both the Shared Key and WEP encryption settings. Set your wireless adapter according to the authentication scheme you choose for the DG834PN RangeMax ADSL Modem Wireless Router. Please refer to "Preparing a Computer for Network Access:" in Appendix B for a full explanation of each of these options, as defined by the IEEE 802.11g wireless communication standard. Encryption Choices Please refer to "Preparing a Computer for Network Access:" in Appendix B for a full explanation of each of the following choices, as defined by the IEEE 802.11g wireless communication standard. Choose the encryption strength from the drop-down list: Disable. No encryption will be applied. This setting is useful for troubleshooting your wireless connection, but leaves your wireless data fully exposed. 64 or 128 bit WEP. When 64 Bit WEP or 128 Bit WEP is selected, WEP encryption will be applied. If WEP is enabled, you can manually or automatically program the four data encryption keys. These values must be identical on all computers and access points in your network. There are two methods for creating WEP encryption keys: Wireless Configuration v1.0, November 2005 3-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104

Reference Manual for the DG834PN RangeMax
TM
ADSL Modem Wireless Router
Wireless Configuration
3-13
v1.0, November 2005
Restricting wireless access prevents intruders from connecting to your network. However, the
wireless data transmissions are still vulnerable to snooping. Using the WEP data encryption
settings described below will prevent a determined intruder from eavesdropping on your wireless
data communications. Also, if you are using the Internet for such activities as purchases or
banking, those Internet sites use another level of highly secure encryption called SSL. You can tell
if a web site is using SSL because the web address begins with HTTPS rather than HTTP.
Authentication Type Selection
The DG834PN lets you select the following wireless authentication schemes.
Automatic
Open System
Shared key
Set your wireless adapter according to the authentication scheme you choose for the DG834PN
RangeMax ADSL Modem Wireless Router. Please refer to
“Preparing a Computer for Network
Access:” in Appendix B
for a full explanation of each of these options, as defined by the IEEE
802.11g wireless communication standard.
Encryption Choices
Please refer to
“Preparing a Computer for Network Access:” in Appendix B
for a full explanation
of each of the following choices, as defined by the IEEE 802.11g wireless communication
standard. Choose the encryption strength from the drop-down list:
Disable.
No encryption will be applied. This setting is useful for troubleshooting your wireless
connection, but leaves your wireless data fully exposed.
64 or 128 bit WEP.
When 64 Bit WEP or 128 Bit WEP is selected, WEP encryption will be
applied.
If WEP is enabled, you can manually or automatically program the four data encryption keys.
These values must be identical on all computers and access points in your network.
There are two methods for creating WEP encryption keys:
Note:
The authentication scheme is separate from the data encryption. You can choose an
authentication scheme which requires a shared key but still leave the data
transmissions unencrypted. If you require strong security, use both the Shared Key
and WEP encryption settings.