Linksys Network Router 3 WEP Security screen, encryption encoding data transmitted in a network

Page 20
Figure 6-3: WEP Security screen

Wireless-G Range Expander

someone could easily obtain the SSID information with site survey software and gain unauthorized access to your network. Click Enable to broadcast the SSID to all wireless devices in range. Click Disable to increase network security and prevent the SSID from being seen on networked PCs.

Channel. Select the appropriate channel from the list provided, between 1 and 11, to correspond with your network settings. All points in your wireless network must use the same channel to function correctly.

Wireless Security. To enable wireless security, through WEP encryption, select the Enable radio button. To disable such security, select the radio button by Disable. To change the security settings to match your network, click the Edit Security Settings button. A notification window will ask if you wish to change the settings. Clicking the Edit Security Settings button will open the following options:

Default Transmit Key. When using WEP keys and not a Passphrase (described below), this selection corresponds with the Key used.

WEP Encryption. Select the level of WEP encryption you wish to use, 64-bit 10 hex digits or 128-bit 26 hex digits. Higher encryption levels offer higher levels of security, but due to the complexity of the encryption, they may decrease network performance.

Passphrase. Instead of manually entering WEP keys, you can enter a Passphrase. This Passphrase is used to generate one or more WEP keys. It is case-sensitive and should not be longer than 16 alphanumeric characters. (This Passphrase function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys wireless products, enter the WEP key manually on the non-Linksys wireless products.) After you enter the Passphrase, click the Generate button to create WEP keys.

Keys 1-4. WEP keys enable you to create an encryption scheme for wireless transmissions. If you are not using a Passphrase, then manually enter a set of values. (Do not leave a key field blank, and do not enter all zeroes. These are not valid key values.)

If you are using 64-bit WEP encryption, then the key must be exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, then the key must be exactly 26 hexadecimal characters in length. Valid hexadecimal characters are “0”-“9” and “A”-“F”.

When finished making your changes on this tab, click the Save Settings button to save these changes, or click the Cancel Changes button to undo your changes.

Access Point MAC Address. In this field, enter the MAC Address of the access point with which the Range Expander is communicating.

Figure 6-3: WEP Security screen

encryption: encoding data transmitted in a network

software: instructions for the computer.

passphrase: used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products.

MAC address: the unique address that a manufacturer assigns to each networking device.

Chapter 5: Configuring the Wireless-G Range Expander

17

The Setup Tab

Image 20
Contents word definition How to Use this GuideCopyright and Trademarks Table of Contents List of Figures Chapter 1 Introduction Welcomerouter - a networking device that connects multiple networks together adapter - a device that adds network functionality to your PCWhat’s in this Guide? Appendix F Warranty Information This appendix supplies the Range Expander’s warranty informationAppendix G Regulatory Information This appendix supplies the Range Expander’s regulatory informationChapter 2 Planning your Wireless Network SSID your wireless networks nameNetwork Topology RoamingNetwork Layout Chapter 3 Getting to Know the Wireless-G Range Expander Powerwhen there is network activity no network with which to connect, this light will appear redwith Cord The Power PlateFigure 3-3 The Two Prong Power Plate Figure 3-2 The Power Plate Chapter 4 Connecting the Wireless-G Range Expander tcp/ip a set of instructions PCs use to communicate over a networkWall Mounting Chapter 5 Setting Up the Wireless-G Range Expander Figure 5-2 Connecting to an access point Click the Next button to continue or Exit to exit the Setup Wizard bit - a binary digit Figure 5-11 The Confirm New Settings screen Chapter 6 Configuring the Wireless-G Range Expander OverviewThe Setup Tab Basic Setupfirmware the programming code that runs a networking device subnet mask an address code that determines the size of the networksoftware instructions for the computer Figure 6-3 WEP Security screenencryption encoding data transmitted in a network Password download to receive a file transmitted over a networkupgrade to replace existing software or firmware with a newer version HelpAppendix A Troubleshooting Common Problems and SolutionsFrequently Asked Questions What IEEE 802.11b features are supported?What is Ad-hoc? What is Infrastructure?What is Roaming? What is ISM band?What is Spread Spectrum? What is DSSS? What is FHSS? And what are their differences?Can Linksys Wireless products support file and printer sharing? What is WEP?How do I avoid interference? How do I reset the Range Expander?How do I resolve issues with signal loss? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions SSID. There are several things to keep in mind about the SSID WPA Pre-Shared Key. If you do not have a RADIUS server, select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption keys Appendix C Upgrading Firmware Appendix D Windows Help TCP/IPShared Resources Network Neighborhood/My Network PlacesAppendix E Glossary Encryption - Encoding data transmitted in a network Router - A networking device that connects multiple networks together Appendix F Specifications Appendix G Warranty Information Appendix H Regulatory Information EN 609 50 Safety An FCC compliant telephone cord and modular plug is provided with this equipment. This equipment is designed to be connected to the telephone network or premises wiring using a compatible modular jack, which is FCC Part 68 compliant. Connection to the telephone network should be made by using the standard modular telephone jack Wireless-G Range Expander Appendix I Contact Information 2.4 802 GHz .11g Wireless- G WIRELESSUser Guide Range Expander