Netgear WGR614v10 Reference Manual - Page 33

Open System, Shared Key, Passphrase, Wireless Settings, Apply, Wireless-G Router - access point setup

Page 33 highlights

Wireless-G Router WGR614v10 Reference Manual WEP offers the following options: • Open System. With Open System authentication and 64 or 128 bit WEP data encryption, the Wireless-G Router does perform data encryption but does not perform any authentication. Anyone can join the network. This setting provides very little practical wireless security. • Shared Key. With Shared Key authentication, a wireless device must know the WEP key to join the network. Select the encryption strength (64 or 128 bit data encryption). Manually enter the key values, or enter a word or group of printable characters in the Passphrase field. Manually entered keys are not case-sensitive, but passphrase characters are case-sensitive. To configure WEP data encryption: Note: If you use a wireless computer to configure WEP settings, you will be disconnected when you click Apply. You must then either configure your wireless adapter to match the wireless router WEP settings or access the wireless router from a wired computer to make any further changes. Not all wireless adapter configuration utilities support passphrase key generation. 1. Select Wireless Settings under Setup in the main menu. 2. In the Security Options section, select WEP. The WEP options display. . Figure 2-3 3. Select the authentication type and encryption strength. 4. You can manually or automatically program the four data encryption keys. These values must be identical on all computers and access points in your network. Safeguarding Your Network 2-8 v1.0, February 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122

Wireless-G Router WGR614v10 Reference Manual
Safeguarding Your Network
2-8
v1.0, February 2010
WEP offers the following options:
Open System
. With Open System authentication and 64 or 128 bit WEP data encryption, the
Wireless-G Router
does
perform data encryption but
does not
perform any authentication.
Anyone can join the network. This setting provides very little practical wireless security.
Shared Key
. With Shared Key authentication, a wireless device must know the WEP key to
join the network. Select the encryption strength (64 or 128 bit data encryption). Manually
enter the key values, or enter a word or group of printable characters in the
Passphrase
field.
Manually entered keys
are not
case-sensitive, but passphrase characters
are
case-sensitive.
To configure WEP data encryption:
1.
Select
Wireless Settings
under Setup in the main menu.
2.
In the Security Options section, select
WEP
. The WEP options display.
.
3.
Select the authentication type and encryption strength.
4.
You can manually or automatically program the four data encryption keys. These values must
be identical on all computers and access points in your network.
Note:
If you use a wireless computer to configure WEP settings, you will be disconnected
when you click
Apply
. You must then either configure your wireless adapter to
match the wireless router WEP settings or access the wireless router from a wired
computer to make any further changes. Not all wireless adapter configuration
utilities support passphrase key generation.
Figure 2-3