RadioLAN WNR834B user manual Basic Wireless Security Options, Wep

Page 33

NETGEAR RangeMax™ NEXT Wireless Router WNR834B User Manual

Security Options

These options are the wireless security features you can enable. Table 3-1identifies the basic wireless security options. For a detailed explanation of these standards, see “Wireless Communications” in Appendix B.

Note: The Security Options displayed in this menu may change depending on the current selection of Wireless Mode.

Table 3-1. Basic Wireless Security Options

Field

Description

 

 

None

No wireless security. Only recommended for troubleshooting wireless connectivity.

 

 

WEP

WEP offers the following options:

 

• Open System

 

With Open Network authentication and 64- or 128-bit WEP Data Encryption, the WNR834B

 

does perform data encryption but does not perform any authentication. Anyone can join the

 

network. This setting provides very little practical wireless security.

 

• Shared Key

 

With Shared Key authentication, a wireless device must know the WEP key in order to join

 

the network. Choose the Encryption Strength (64- or 128-bit data encryption). Manually

 

enter the key values or enter a word or group of printable characters in the Passphrase box.

 

Manually entered keys are not case sensitive but passphrase characters are case sensitive.

 

Note: Not all wireless adapter configuration utilities support passphrase key generation.

 

• Auto

 

The wireless router automatically detects whether Open System or Shared Key is used.

 

 

WPA-PSK

WPA-Pre-shared Key does perform authentication. WPA-PSK uses TKIP (Temporal Key

WPA2-PSK

Integrity Protocol) data encryption and WPA2-PSK uses AES (Advanced Encryption Standard)

 

data encryption. Both methods dynamically change the encryption keys making them nearly

 

impossible to circumvent.

 

Enter a word or group of printable characters in the Password Phrase box. These characters

 

are case sensitive.

 

Note: Not all wireless adapter configuration utilities support WPA-PSK and WPA2-PSK.

 

Furthermore, client software is required on the client. Windows XP Service Pack 2 and

 

Windows XP Service Pack 1 with WPA patch do include the client software that supports WPA.

 

However, the wireless adapter hardware and driver must also support WPA.

 

 

Balancing performance factors (throughput, latency, battery consumption, and equipment compatibility) against the value of information on your network, select an appropriate security level. As a minimum, NETGEAR recommends using WEP with Shared Key authentication.

Safeguarding Your Network

3-5

v1.2, January 2007

Image 33
Contents Netgear RangeMax Next Wireless Router Trademarks Product Registration, Support, and DocumentationStatement of Conditions Certificate of the Manufacturer/ImporterEurope EU Declaration of Conformity Regulatory Compliance InformationFCC Information to User FCC Requirements for Operation in the United StatesFCC Guidelines for Human Exposure FCC Declaration Of ConformityFCC Radio Frequency Interference Warnings & Instructions WNR834B Product and Publication DetailsContents Chapter Customizing Your Network Settings Appendix a Technical Specifications V1.2, January Conventions, Formats and Scope Chapter About This ManualHow to Print this Manual How to Use This ManualPublication Revision History Revision HistoryV1.2, January Using the Setup Manual Chapter Configuring Basic ConnectivityRangeMax Next Wireless Router WNR834B Online Setup Manuals Accessing the Wireless Router For ConfigurationHttp//192.168.1.1 V1.2, January Viewing and Configuring Basic ISP Settings ISP Does Not Require Login No Login Required by ISPV1.2, January ISP Does Require Login Login Required by ISPV1.2, January Viewing the Basic Wireless Settings Configuring Wireless SettingsV1.2, January V1.2, January Viewing the Advanced Wireless Settings V1.2, January Choosing Appropriate Wireless Security Chapter Safeguarding Your NetworkSafeguarding Your Network Changing Wireless Security Settings Recommended Security SettingsV1.2, January WEP Basic Wireless Security OptionsConfiguring Security in the Advanced Wireless Settings Menu V1.2, January If WPA-PSK or WPA2-PSK Authentication is used Configuring WEP Wireless SecurityV1.2, January Configuring WPA-PSK or WPA2-PSK Wireless Security V1.2, January Restricting Wireless Access by MAC Address V1.2, January Changing the Administrator Password Backing Up Your Configuration Understanding Your Firewall Restricting Access From Your Network Content Filtering OverviewBlocking Access to Internet Sites Restricting Access From Your Network Blocking Access to Internet Services Blocking Services by IP Address Range Configuring a User Defined ServiceScheduling Blocking Log entry descriptions Viewing Logs of Web Access or Attempted Web AccessLog action buttons Configuring Email Alert and Web Access Log NotificationsSetting the Time V1.2, January V1.2, January Using the LAN IP Setup Options Chapter Customizing Your Network SettingsConfiguring LAN TCP/IP Setup Parameters Using the Router as a Dhcp server Using Address Reservation Using a Dynamic DNS Service Configuring the WAN Setup Options Connecting Automatically, as Required Setting Up a Default DMZ ServerDisabling the SPI Firewall Configuring Static Routes Setting the MTU SizeResponding to a Ping on the Internet WAN Port V1.2, January V1.2, January Allowing Inbound Connections To Your Network Chapter Fine-Tuning Your NetworkFine-Tuning Your Network How Port Triggering Changes the Communication Process V1.2, January How Port Forwarding Changes the Communication Process How Port Forwarding Differs From Port Triggering Configuring Port Forwarding to Local ServersAdding a Custom Service Application Example Making a Local Web Server Public Editing or Deleting a Port Forwarding EntryTo the instructions in Using Universal Plug and Play on Configuring Port TriggeringV1.2, January V1.2, January Using Universal Plug and Play Optimizing Wireless Performance Changing the MTU Common MTU Sizes MSNOptimizing Your Network Bandwidth Broadband Internet Overview of Home and Small Office Networking TechnologiesAssessing Your Speed Requirements PowerlineNetwork Connection Theoretical Raw Transfer Time Theoretical Transfer Time for 1 GigabyteV1.2, January Viewing Wireless Router Status Information Chapter Using Network Monitoring ToolsWireless Router Status Fields Default is Connection Status Items Router Statistics Items Viewing a List of Attached Devices Managing the Configuration FileBacking Up and Restoring the Configuration Upgrading the Router Software Erasing the ConfigurationV1.2, January Enabling Remote Management Access V1.2, January V1.2, January Chapter Troubleshooting Troubleshooting Quick TipsBe sure to restart your network in this sequence Make sure the network settings of the computer are correct Troubleshooting Basic FunctionsMake sure the Ethernet cables are securely plugged Check the test light to verify correct router operationPower light is not on or is blinking Lights never turn offLAN or WAN port lights are not lit Wireless light is not lit Troubleshooting the Web Configuration Interface Troubleshooting the Internet Connection Testing the LAN Path to Your Router Troubleshooting a Network Using a Ping UtilityRequest timed out Testing the Path from Your Computer to a Remote DeviceSolving Wireless Connection Problems Problems with Date and TimeSetting Up and Testing Basic Wireless Connectivity Using Your Wireless Card Setup ProgramV1.2, January V1.2, January Restoring the Default Configuration and Password V1.2, January Factory Default Settings Appendix a Technical SpecificationsWireless General SpecificationsElectromagnetic Emissions V1.2, January Document Link Appendix B Related DocumentsV1.2, January Index Index-2