Cisco Systems WRT54GS2 manual Wireless Wireless Security

Page 15

Chapter 3

Advanced Configuration

Method #1

Use this method if your client device has a Wi-Fi Protected Setup button.

1.Click or press the Wi-Fi Protected Setup button on the client device.

2.Click the WiFi Protected Setup button on this screen.

3.After the client device has been configured, click OK. Then refer back to your client device or its documentation for further instructions.

Method #2

Use this method if your client device has a Wi-Fi Protected Setup PIN number.

1.Enter the PIN number in the field on this screen.

2.Click Register.

3.After the client device has been configured, click OK. Then refer back to your client device or its documentation for further instructions.

Method #3

Use this method if your client device asks for the Router’s PIN number.

1.Enter the PIN number listed on this screen. (It is also listed on the label on the bottom of the Router.)

2.After the client device has been configured, click OK. Then refer back to your client device or its documentation for further instructions.

The Wi-Fi Protected Setup Status, Network Name (SSID), Security, Encryption, and Passphrase are displayed at the bottom of the screen.

NOTE: If you have client devices that do not support Wi-Fi Protected Setup, note the wireless settings, and then manually configure those client devices.

Wireless > Wireless Security

The Wireless Security settings configure the security of your wireless network. There are six wireless security mode options supported by the Router: WPA Personal, WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS, and WEP. (WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption. WPA2 is a more advanced, more secure version of WPA. WEP stands for Wired Equivalent Privacy, and RADIUS stands for Remote Authentication Dial-In User Service.) These six are briefly discussed here. For detailed instructions on configuring wireless security for the Router, refer to Chapter 2: Wireless Security Checklist, page 3.

Wireless Security

Security Mode

Select the security method for your wireless network. If you do not want to use wireless security, keep the default, Disabled.

WPA Personal

NOTE: If you are using WPA, always remember that each device in your wireless network MUST use the same WPA method and shared key, or else the network will not function properly.

Security Mode > WPA Personal

WPA Algorithm  WPA supports the TKIP encryption method, with dynamic encryption keys.

WPA Shared Key  Enter the key shared by the Router and your other network devices. It must have 8-63 characters.

Group Key Renewal  Enter a Key Renewal period, which tells the Router how often it should change the encryption keys. The default Group Key Renewal period is 3600 seconds.

WPA2 Personal

Security Mode > WPA2 Personal

WPA Algorithm  WPA2 supports two encryption methods, TKIP and AES, with dynamic encryption keys.

Wireless-G Broadband Router with SpeedBooster

11

Image 15
Contents Wireless-G Broadband Router with SpeedBooster Icon Descriptions Online ResourcesCopyright and Trademarks Table of Contents Appendix E Software License Agreement Appendix D Regulatory InformationBack Panel Placement PositionsHorizontal Placement Front Panel152 mm Wall-Mounting PlacementAdditional Security Tips General Network Security GuidelinesAutomatic Configuration Dhcp How to Access the Web-Based UtilitySetup Basic Setup Internet SetupPPPoE Static IPTelstra Cable Optional SettingsTime Setting Setup DdnsNetwork Setup Network Address Server Settings DhcpDynDNS.org Setup MAC Address CloneDdns Service MAC Address CloneSetup Advanced Routing Advanced RoutingDynamic Routing Wireless Basic Wireless Settings Basic Wireless SettingsWi-Fi Protected Setup Wireless Security Wireless Wireless SecurityWPA2 Enterprise WPA EnterpriseWireless MAC Filter Wireless Wireless MAC FilterAdvanced Wireless Wireless Advanced Wireless SettingsVPN Passthrough Security FirewallSecurity VPN FirewallInternet Access To create an Internet Access policyBlocked Services Website Blocking by Keyword Applications and Gaming Port Range ForwardPort Range Forward Website Blocking by URL AddressPort Triggering Applications and Gaming DMZApplications and Gaming QoS Applications & Gaming Port TriggeringEthernet Port Priority Administration ManagementWireless QoS Device PriorityAdministration Diagnostics Administration LogAdministration Factory Defaults Administration Upgrade FirmwareAdministration Config Management Internet Status RouterStatus Local Network Router InformationWireless Status WirelessAppendix a Troubleshooting Appendix B Specifications Limited Warranty Obtaining Warranty ServiceExclusions and Limitations Technical Support Industry Canada Statement Safety NoticesFCC Statement FCC Radiation Exposure StatementAvis d’Industrie Canada Wireless DisclaimerDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Software in Linksys Products Software LicensesSchedule 1 Linksys Software License Agreement Preamble ScheduleSoftware License Agreement Software License Agreement No Warranty GNU Lesser General Public License Software License Agreement Software License Agreement Software License Agreement No Warranty Original SSLeay License OpenSSL License8102010NC-JL