Cisco Systems WRT610N Wireless Wireless Security, GHz or 2.4 GHz Wireless Security, Security Mode

Page 16

Chapter 3

Advanced Configuration

3.After the client device has been configured, click OK on the Router’s Wi-Fi Protected Setup screen. Then refer back to your client device or its documentation for further instructions.

Method #3  Use this method if your client device asks for the Router’s PIN number.

1.On the client device, enter the PIN number listed on the Router’s Wi-Fi Protected Setup screen. (It is also listed on the label on the bottom of the Router.)

2.After the client device has been configured, click OK on the Router’s Wi-Fi Protected Setup screen. Then refer back to your client device or its documentation for further instructions.

The Wi-Fi Protected Setup Status, Network Name (SSID), Security, and Passphrase are displayed at the bottom of the screen.

NOTE: If you have client devices that do not support Wi-Fi Protected Setup, note the wireless settings, and then manually configure those client devices.

Wireless > Wireless Security

The wireless security settings configure the security of your wireless network(s). The Router supports the following wireless security options: WPA2 Personal, WPA Personal, WPA2 Enterprise, WPA Enterprise, RADIUS, and WEP. WPA (Wi-Fi Protected Access) is a stronger security standard than WEP (Wireless Equivalent Privacy), and WPA2 is even more secure than WPA. RADIUS is Remote Authentication Dial-In User Service.

5 GHz or 2.4 GHz Wireless Security

Wireless security is strongly recommended, and WPA2 is the strongest method available. Use WPA2 if it is supported by all of your wireless devices.

Security Mode

Select the security method for each wireless network. If you do not want to use wireless security, keep the default, Disabled.

WPA2 Personal

NOTE: If you are using WPA2 or WPA, each device in your wireless network MUST use the same WPA method and shared key, or else the network will not function properly.

]

WPA2 Personal

Encryption  WPA2 supports two encryption methods with dynamic encryption keys, AES or WPA-TKIP/ WPA2AES. The default is AES.

Passphrase  Enter a passphrase of 8-63 characters.

Key Renewal  Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys. The default is 3600 seconds.

WPA Personal

NOTE: If you are using WPA2 or WPA, each device in your wireless network MUST use the same WPA method and shared key, or else the network will not function properly.

WPA Personal

Encryption   WPA uses TKIP, an encryption method with dynamic encryption keys.

Passphrase  Enter a passphrase of 8-63 characters.

Key Renewal  Enter a Key Renewal period, which instructs the Router how often it should change the encryption keys. The default period is 3600 seconds.

Simultaneous Dual-Band Wireless-N Gigabit Router

14

Image 16
Contents Simultaneous Dual-Band Wireless-N Gigabit Router Online Resources Icon DescriptionsCopyright and Trademarks Table of Contents Appendix E Regulatory Information Appendix C Specifications Appendix D Warranty InformationAppendix F Software End User License Agreement Front Panel Back PanelHorizontal Placement Wall-Mounting PlacementGeneral Network Security Guidelines Additional Security TipsSetup Basic Setup How to Access the Browser-Based UtilityInternet Setup LanguageStatic IP Automatic Configuration DhcpPPPoE Optional Settings Telstra CableNetwork Setup Dhcp Server SettingsRouter Address Dhcp ReservationSetup Ddns Time SettingDdns Service DynDNS.orgSetup MAC Address Clone Setup Advanced RoutingMAC Address Clone Advanced RoutingWireless Basic Wireless Settings Wireless Configuration ManualGHz or 2.4 GHz Wireless Settings Simultaneous NetworksWi-Fi Protected Setup Wireless Wireless Security GHz or 2.4 GHz Wireless SecuritySecurity Mode WPA2 PersonalWPA2 Enterprise WPA EnterpriseRadius Wireless Wireless MAC Filter Wireless MAC FilterAdvanced Wireless Access RestrictionAdvanced Configuration Security Firewall Security VPN PassthroughFirewall Web FiltersStorage Disk Disk DetailShared Folder Format DiskSetup AccessStorage Media Server DatabaseAccess Storage FTP ServerAdd a Media Folder Media FolderInformation Storage AdministrationCreate or Edit an FTP Folder User Management Group ManagementCreate or Edit a User Account Create or Edit a Group AccountInternet Access Policy SummaryApplications and Gaming Single Port Forwarding Applications and Gaming Port Range ForwardingSingle Port Forwarding Port Range ForwardingApplications and Gaming DMZ Applications & Gaming Port Range TriggeringPort Range Triggering QoS Quality of Service Applications and Gaming QoSOnline Games Add a New GameMAC Address Ethernet PortRouter Password Administration ManagementSummary Administration Log Administration DiagnosticsBackup and Restore LogAdministration Factory Defaults Administration Firmware UpgradeDiagnostics Factory DefaultsStatus Router Status Local NetworkStatus Wireless Network 5GHz/2.4GHz Wireless NetworkAppendix a Troubleshooting Click the Administration tab Install the USB Storage Device Access the USB Storage DeviceOverview Windows VistaCreate a Shortcut to a Shared Folder Map a DriveAccess Mapped Drive Access the Browser-Based Utility Advanced Configuration Advanced Users OnlyCreate a Shared Folder Create a User Group Account Create a User Account Appendix C Specifications Limited Warranty Exclusions and LimitationsObtaining Warranty Service Technical Support Safety Notices Industry Canada Statement FCC StatementFCC Radiation Exposure Statement Restrictions in the 5 GHz BandAvis d’Industrie Canada Wireless DisclaimerRestrictions dans la bande 5 GHz Dansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Software Licenses Cisco ProductsSchedule Cisco Software License Agreement Software End User License Agreement Software End User License Agreement Schedule Network Magic Features Schedule 3-A Schedule Open Source and Third Party LicensesPreamble Software End User License Agreement No Warranty Schedule 3-B GNU Lesser General Public LicenseSoftware End User License Agreement Software End User License Agreement Software End User License Agreement END of Schedule 3-B OpenSSL License Schedule 3-COriginal SSLeay License END of Schedule 3-C