
Reference Manual for the RangeMax 240 Wireless Router WPNT834
Table | A Road Map for How to Get There From Here (continued) | |||
|
|
|
| |
If I Want To? | What Do I Do? | What’s Needed? | How Do I? | |
|
|
|
|
|
Protect my | 1. | Assure that the | • A wireless network WEP or | To learn about wireless |
wireless |
| wireless network | WPA security enabled. | networking security, see |
connection |
| has security | • Wireless networking | “Wireless Communications” in |
(from snooping, |
| features enabled. | equipment that supports | Appendix B. |
hacking, or |
|
| ||
2. | Configure my | WEP or WPA, such as the |
| |
information |
| |||
WPNT834. |
| |||
| WPNT834 with the | To use WEP security features, | ||
theft). |
| |||
|
| |||
| security settings of |
| see “Implementing Appropriate | |
|
|
| ||
|
| the wireless |
| Wireless Security” on page |
|
| network. |
| and configure your WPNT834 |
| 3. | Use Windows |
| accordingly. |
|
| security features. |
|
|
| ||||
Note: Secure Internet sites such as banks and online merchants use encryption security built into browsers | ||||
like Internet Explorer and Netscape. Any wireless networking security features you might implement are in | ||||
addition to those already in place on secure Internet sites. |
| |||
|
|
|
|
|
Introduction |