Netgear WGR614v5 WGR614v5 Reference Manual - Page 22

Table 2-1., A Road Map for How to Get There From Here, If I Want To?, What Do I Do?, What's Needed? - hack

Page 22 highlights

Reference Manual for the 54 Mbps Wireless Router WGR614 v5 exposes them to the inherent complexity of networking. General networking concepts, setup, and maintenance can be difficult to understand. In addition, wireless technology adds issues, such as range, interference, signal quality, and security to the picture. To help overcome potential barriers to successfully using home networks, the table below identifies how to accomplish such things as connecting to a wireless network, assuring appropriate security measures are taken, browsing the Internet through your wireless connection, exchanging files with other computers and using printers in the combined wireless and wired network. Table 2-1. A Road Map for How to Get There From Here If I Want To? What Do I Do? What's Needed? How Do I? Set up a wireless network 1. Set up the 54 Mbps Wireless Router WGR614 v5 2. Identify the wireless network name (SSID) and, if used, the wireless security settings. 3. Set up the wireless computers with the settings from step 1. • A wireless network • A computer within the operating range of the wireless network. For guidelines about the range of wireless networks, see "Observe Performance, Placement, and Range Guidelines" on page 4-1". To set up the WGR614 v5, see Chapter 3, "Connecting the Router to the Internet" and follow the instructions provided. To learn about wireless networking technology, see Appendix 4, "Wireless Configuration" for a general introduction. Protect my wireless connection from snooping, hacking, or information theft. 1. Assure that the wireless network has security features enabled. • A wireless network WEP or WPA security enabled. • Wireless networking equipment that supports To learn about wireless networking security, see "Wireless Networking Basics" on page D-1. 2. Configure my WGR614 v5 with WEP or WPA, such as the WGR614 v5. To use WEP security features, the security settings see "Implement Appropriate of the wireless Wireless Security" on page 4-2" network. and configure your WGR614 v5 3. Use Windows accordingly. security features. Note: Secure Internet sites such as banks and online merchants use encryption security built into browsers like Internet Explorer and Netscape. Any wireless networking security features you might implement are in addition to those already in place on secure Internet sites. 2-8 Introduction June 2004 202-10036-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172

Reference Manual for the 54 Mbps Wireless Router WGR614 v5
2-8
Introduction
June 2004 202-10036-01
exposes them to the inherent complexity of networking. General networking concepts, setup, and
maintenance can be difficult to understand. In addition, wireless technology adds issues, such as
range, interference, signal quality, and security to the picture.
To help overcome potential barriers to successfully using home networks, the table below
identifies how to accomplish such things as connecting to a wireless network, assuring appropriate
security measures are taken, browsing the Internet through your wireless connection, exchanging
files with other computers and using printers in the combined wireless and wired network.
Table 2-1.
A Road Map for How to Get There From Here
If I Want To?
What Do I Do?
What’s Needed?
How Do I?
Set up a
wireless
network
1.
Set up the 54 Mbps
Wireless Router
WGR614 v5
2.
Identify the wireless
network name
(SSID) and, if used,
the wireless
security settings.
3.
Set up the wireless
computers with the
settings from step
1.
A wireless network
A computer within the
operating range of the
wireless network. For
guidelines about the range
of wireless networks, see
“Observe Performance,
Placement, and Range
Guidelines” on page 4-1
”.
To set up the WGR614 v5, see
Chapter 3, “Connecting the
Router to the Internet
” and follow
the instructions provided.
To learn about wireless
networking technology, see
Appendix 4, “Wireless
Configuration
” for a general
introduction.
Protect my
wireless
connection
from snooping,
hacking, or
information
theft.
1.
Assure that the
wireless network
has security
features enabled.
2.
Configure my
WGR614 v5 with
the security settings
of the wireless
network.
3.
Use Windows
security features.
A wireless network WEP or
WPA security enabled.
Wireless networking
equipment that supports
WEP or WPA, such as the
WGR614 v5.
To learn about wireless
networking security, see
“Wireless Networking Basics” on
page D-1
.
To use WEP security features,
see
“Implement Appropriate
Wireless Security” on page 4-2
and configure your WGR614 v5
accordingly.
Note:
Secure Internet sites such as banks and online merchants use encryption security built into browsers
like Internet Explorer and Netscape. Any wireless networking security features you might implement are in
addition to those already in place on secure Internet sites.