Netgear WGR614v3 WGR614v3 Reference Manual - Page 39

Understanding WEP Authentication and Encryption, Authentication Scheme Selection

Page 39 highlights

Reference Manual for Cable/DSL Wireless Router WGR614 Understanding WEP Authentication and Encryption Restricting wireless access to your network prevents intruders from connecting to your network. However, the wireless data transmissions are still vulnerable to snooping. Using the WEB data encryption settings described below will prevent a determined intruder from eavesdropping on your wireless data communications. Also, if you are using the Internet for such activities as purchases or banking, those Internet sites use another level of highly secure encryption called SSL. You can tell if a web site is using SSL because the web address begins with HTTPS rather than HTTP. Authentication Scheme Selection Figure 3-3: Encryption Strength The WGR614 lets you select the following wireless authentication schemes. • Automatic. • Open System. • Shared key. Note: The authentication scheme is separate from the data encryption. You can choose an authentication scheme which requires a shared key but still leave the data transmissions unencrypted. If you require strong security, use both the Shared Key and WEP encryption settings. Be sure to set your wireless adapter according to the authentication scheme you choose for the WGR614 router. Please refer to "Authentication and WEP" on page D-3 for a full explanation of each of these options, as defined by the IEEE 802.11 wireless communication standard. Encryption Strength Choices Choose the encryption strength from the drop-down list. Please refer to "Overview of WEP Parameters" on page D-5 for a full explanation of each of these options, as defined by the IEEE 802.11 wireless communication standard. Wireless Configuration 3-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146

Reference Manual for Cable/DSL Wireless Router WGR614
Wireless Configuration
3-5
Understanding WEP Authentication and Encryption
Restricting wireless access to your network prevents intruders from connecting to your network.
However, the wireless data transmissions are still vulnerable to snooping. Using the WEB data
encryption settings described below will prevent a determined intruder from eavesdropping on
your wireless data communications. Also, if you are using the Internet for such activities as
purchases or banking, those Internet sites use another level of highly secure encryption called SSL.
You can tell if a web site is using SSL because the web address begins with HTTPS rather than
HTTP.
Authentication Scheme Selection
Figure 3-3:
Encryption Strength
The WGR614 lets you select the following wireless authentication schemes.
Automatic.
Open System.
Shared key.
Be sure to set your wireless adapter according to the authentication scheme you choose for the
WGR614 router. Please refer to
“Authentication and WEP” on page D-3
for a full explanation of
each of these options, as defined by the IEEE 802.11 wireless communication standard.
Encryption Strength Choices
Choose the encryption strength from the drop-down list. Please refer to
“Overview of WEP
Parameters” on page D-5
for a full explanation of each of these options, as defined by the IEEE
802.11 wireless communication standard.
Note:
The authentication scheme is separate from the data encryption. You can
choose an authentication scheme which requires a shared key but still leave the
data transmissions unencrypted. If you require strong security, use both the
Shared Key and WEP encryption settings
.