Netgear WGR614v10 Reference Manual - Page 32

Configuring WEP Wireless Security, Name SSID, NETGEAR, Region, Channel, Security Options, Apply - slow

Page 32 highlights

Wireless-G Router WGR614v10 Reference Manual • Name (SSID). The SSID is also known as the wireless network name. Enter a value of up to 32 alphanumeric characters. When more than one wireless network is active, different wireless network names provide a way to separate the traffic. For a wireless device to participate in a particular wireless network, it must be configured with the SSID for that network. The WGR614v10 default SSID is NETGEAR. You can disable this broadcast as described in "Viewing Advanced Wireless Settings" on page 2-10. • Region. This field identifies the region where the Wireless-G Router can be used. It might not be legal to operate the wireless features of the wireless router in a region other than one of those identified in this field. Note: The region selection feature might not be available in all countries. • Channel. This field determines which operating frequency is used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby wireless network. The wireless router uses channel bonding technology to extend the bandwidth for data transmission. For more information about the wireless channel frequencies, see the online document that you can access from "Wireless Networking Basics" in Appendix B. • Mode. This field determines which data communications protocol is used. You can choose from: b and g; or g only. • Security Options. The selection of wireless security options can significantly affect your network performance. The time it takes to establish a wireless connection can vary depending on both your security settings and router placement. WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2PSK encryption can consume more battery power on a notebook computer, and can cause significant performance degradation with a slow computer. Instructions for configuring the security options can be found in "Choosing Appropriate Wireless Security" on page 2-1. A full explanation of wireless security standards is available in the online document that you can access from "Wireless Networking Basics" in Appendix B. 3. Click Apply to save your settings. Configuring WEP Wireless Security WEP Shared Key authentication and WEP data encryption can be defeated by a determined eavesdropper using publicly available tools. Safeguarding Your Network 2-7 v1.0, February 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122

Wireless-G Router WGR614v10 Reference Manual
Safeguarding Your Network
2-7
v1.0, February 2010
Name (SSID)
. The SSID is also known as the wireless network name. Enter a value of up to
32 alphanumeric characters. When more than one wireless network is active, different wireless
network names provide a way to separate the traffic. For a wireless device to participate in a
particular wireless network, it must be configured with the SSID for that network. The
WGR614v10 default SSID is
NETGEAR
. You can disable this broadcast as described in
“Viewing Advanced Wireless Settings” on page 2-10
.
Region
. This field identifies the region where the Wireless-G Router can be used. It might not
be legal to operate the wireless features of the wireless router in a region other than one of
those identified in this field.
Channel
. This field determines which operating frequency is used. It should not be necessary
to change the wireless channel unless you notice interference problems with another nearby
wireless network. The wireless router uses channel bonding technology to extend the
bandwidth for data transmission. For more information about the wireless channel
frequencies, see the online document that you can access from
“Wireless Networking Basics”
in Appendix B
.
Mode
. This field determines which data communications protocol is used. You can choose
from: b and g; or g only.
Security Options
. The selection of wireless security options can significantly affect your
network performance. The time it takes to establish a wireless connection can vary depending
on both your security settings and router placement.
WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-
PSK encryption can consume more battery power on a notebook computer, and can cause
significant performance degradation with a slow computer. Instructions for configuring the
security options can be found in
“Choosing Appropriate Wireless Security” on page 2-1
. A full
explanation of wireless security standards is available in the online document that you can
access from
“Wireless Networking Basics” in Appendix B
.
3.
Click
Apply
to save your settings.
Configuring WEP Wireless Security
WEP Shared Key authentication and WEP data encryption can be defeated by a determined
eavesdropper using publicly available tools.
Note:
The region selection feature might not be available in all countries.