Netgear MR814 MR814v3 Reference Manual - Page 22

Table 2-1., A Road Map for How to Get There From Here, If I Want To?, What Do I Do?, What's Needed?

Page 22 highlights

Reference Manual for the MR814 v3 Cable/DSL Wireless Router range, interference, signal quality, and security to the picture. To help overcome potential barriers to successfully using home networks, the table below identifies how to accomplish such things as connecting to a wireless network, assuring appropriate security measures are taken, browsing the Internet through your wireless connection, exchanging files with other computers and using printers in the combined wireless and wired network. Table 2-1. A Road Map for How to Get There From Here If I Want To? What Do I Do? What's Needed? How Do I? Set up a wireless network 1. Choose a wireless network name (SSID) and, decide if you need to use wireless security, and if so, what settings to use. 2. Set up the MR814 v3 Cable/DSL Wireless Router with settings based on step 1. • Wireless network equipment such as the MR814 v3 Cable/DSL Wireless Router. • A computer within the operating range of the wireless network. For guidelines about the range of wireless networks, see "Observe Performance, Placement, and Range Guidelines". To set up the MR814 v3, see Chapter 3, "Connecting the Router to the Internet and follow the instructions provided. To learn about wireless networking technology, see Appendix D, "Wireless Networking Basics for a general introduction. 3. Set up the wireless computers with the settings from step 2. Protect my wireless connection from snooping, hacking, or information theft. 1. Assure that the wireless network has security features enabled. 2. Configure my MR814 v3 with the security settings of the wireless network. 3. Use Windows security features. • A wireless network WEP security enabled. • Wireless networking equipment that supports WEP, such as the MR814 v3 and all NETGEAR wireless networking products. To learn about wireless networking security, see "Authentication and WEP" on page -4. To use WEP security features, see "Implement Appropriate Wireless Security" and configure your MR814 v3 accordingly. Note: Secure Internet sites such as banks and online merchants use encryption security built into browsers like Internet Explorer and Netscape. Any wireless networking security features you might implement are in addition to those already in place on secure Internet sites. 2-8 Introduction 202-10039-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162

Reference Manual for the MR814 v3 Cable/DSL Wireless Router
2-8
Introduction
202-10039-01
range, interference, signal quality, and security to the picture.
To help overcome potential barriers to successfully using home networks, the table below
identifies how to accomplish such things as connecting to a wireless network, assuring appropriate
security measures are taken, browsing the Internet through your wireless connection, exchanging
files with other computers and using printers in the combined wireless and wired network.
Table 2-1.
A Road Map for How to Get There From Here
If I Want To?
What Do I Do?
What’s Needed?
How Do I?
Set up a
wireless
network
1.
Choose a wireless
network name
(SSID) and, decide if
you need to use
wireless security,
and if so, what
settings to use.
2.
Set up the MR814
v3 Cable/DSL
Wireless Router with
settings based on
step 1.
3.
Set up the wireless
computers with the
settings from step 2.
Wireless network
equipment such as the
MR814 v3 Cable/DSL
Wireless Router.
A computer within the
operating range of the
wireless network. For
guidelines about the range
of wireless networks, see
“Observe Performance,
Placement, and Range
Guidelines
”.
To set up the MR814 v3, see
Chapter 3, “Connecting the
Router to the Internet
and follow
the instructions provided.
To learn about wireless
networking technology, see
Appendix D, “Wireless
Networking Basics
for a general
introduction.
Protect my
wireless
connection
from snooping,
hacking, or
information
theft.
1.
Assure that the
wireless network
has security
features enabled.
2.
Configure my
MR814 v3 with the
security settings of
the wireless
network.
3.
Use Windows
security features.
A wireless network WEP
security enabled.
Wireless networking
equipment that supports
WEP, such as the MR814
v3 and all NETGEAR
wireless networking
products.
To learn about wireless
networking security, see
“Authentication and WEP“ on
page -4
.
To use WEP security features,
see
“Implement Appropriate
Wireless Security
” and configure
your MR814 v3 accordingly.
Note:
Secure Internet sites such as banks and online merchants use encryption security built into browsers
like Internet Explorer and Netscape. Any wireless networking security features you might implement are in
addition to those already in place on secure Internet sites.