Linksys WRT54G2 manual Wireless Wireless Security, Method #2, Method #3, Security Mode

Page 15

Chapter 3

Advanced Configuration

3.After the client device has been configured, click OK. Then refer back to your client device or its documentation for further instructions.

Method #2

Use this method if your client device has a Wi-Fi Protected Setup PIN number.

1.Enter the PIN number in the field on this screen.

2.Click Register.

3.After the client device has been configured, click OK. Then refer back to your client device or its documentation for further instructions.

Method #3

Use this method if your client device asks for the Router’s PIN number.

1.Enter the PIN number listed on this screen. (It is also listed on the label on the bottom of the Router.)

2.After the client device has been configured, click OK. Then refer back to your client device or its documentation for further instructions.

The Wi-Fi Protected Setup Status, Network Name (SSID), Security, Encryption, and Passphrase are displayed at the bottom of the screen.

NOTE: If you have client devices that do not support Wi-Fi Protected Setup, note the wireless settings, and then manually configure those client devices.

Wireless > Wireless Security

The Wireless Security settings configure the security of your wireless network. There are six wireless security mode options supported by the Router: WPA Personal, WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS, and WEP. (WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption. WPA2 is a more advanced, more secure version of WPA. WEP stands for Wired Equivalent Privacy, and RADIUS stands for Remote Authentication Dial-In User Service.) These six are briefly discussed here. For detailed instructions on configuring wireless security for the Router, refer to “Chapter 2: Wireless Security.”

Wireless Security

Security Mode

Select the security method for your wireless network. If you do not want to use wireless security, keep the default, Disabled.

WPA Personal

NOTE: If you are using WPA, always remember that each device in your wireless network MUST use the same WPA method and shared key, or else the network will not function properly.

Security Mode > WPA Personal

WPA Algorithm  WPA supports two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, TKIP or AES. (AES is a stronger encryption method than TKIP.)

WPA Shared Key  Enter the key shared by the Router and your other network devices. It must have 8-63 characters.

Group Key Renewal  Enter a Key Renewal period, which tells the Router how often it should change the encryption keys. The default Group Key Renewal period is 3600 seconds.

WPA Enterprise

This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.)

Security Mode > WPA Enterprise

WPA Algorithm  WPA supports two encryption m ethods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, TKIP or AES. (AES is a stronger encryption method than TKIP.)

Wireless-G Broadband Router

11

Image 15
Contents User Guide Copyright and Trademarks About This GuideIcon Descriptions Online ResourcesTable of Contents Appendix D Regulatory Information Front Panel Placement PositionsHorizontal Placement Chapter Product Overview152 mm Wall-Mounting PlacementChapter Wireless Security Checklist General Network Security GuidelinesAdditional Security Tips Internet Setup Chapter Advanced ConfigurationHow to Access the Web-Based Utility Setup Basic SetupPPPoE Static IPTelstra Cable Optional SettingsNetwork Setup Setup DdnsDynDNS.org Setup MAC Address CloneSetup Advanced Routing MAC Address CloneWireless Basic Wireless Settings Advanced RoutingDynamic Routing Basic Wireless Settings Wi-Fi Protected SetupMethod #1 Method #2 Wireless Wireless SecurityWireless Security Security ModeWPA2 Enterprise WPA2 PersonalWireless MAC Filter Wireless Wireless MAC FilterAdvanced Wireless VPN Passthrough Security FirewallFirewall Security VPN PassthroughInternet Access To create an Internet Access policyBlocked Services Port Triggering Applications and Gaming Port Range ForwardPort Range Forward Applications & Gaming Port TriggeringApplications and Gaming DMZ Applications and Gaming QoSQoS Administration Management Wireless QoSRouter Password Administration Log Administration DiagnosticsAdministration Factory Defaults Administration Upgrade Firmware Administration Config ManagementStatus Router Local Network Status WirelessWireless Status Local NetworkYour computer cannot connect to the Internet Appendix a TroubleshootingWRT54G2 Appendix B SpecificationsLimited Warranty Obtaining Warranty ServiceExclusions and Limitations Technical Support Industry Canada Statement Safety NoticesFCC Statement FCC Radiation Exposure StatementAvis d’Industrie Canada Wireless DisclaimerDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information