Linksys WRT120N Wireless Wireless MAC Filter, Access Restriction, MAC Address Filter List, Wep

Page 18

Chapter 3

Advanced Configuration

WEP

WEP is a basic encryption method, which is not as secure as WPA.

IMPORTANT: If you are using WEP encryption, then each device in your wireless network MUST use the same WEP encryption method and key, or else the network will not function properly.

Security Mode > WEP

Encryption  Select a level of WEP encryption, 40/64 bits (10 hex digits) or 104/128 bits (26 hex digits). The default is 40/64 bits (10 hex digits).

Passphrase  Enter a Passphrase to automatically generate WEP keys. Then click Generate.

Key 1  If you did not enter a Passphrase, enter the WEP key manually.

TX Key  TX (Transmit) Key 1 is used.

Click Save Settings to apply your changes, or click Cancel Changes to clear your changes.

Wireless > Wireless MAC Filter

Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius.

Wireless > Wireless MAC Filter

Wireless MAC Filter

Enabled/Disabled  To filter wireless users by MAC Address, either permitting or blocking access, select Enabled. If you do not wish to filter users by MAC Address, keep the default, Disabled.

Access Restriction

Prevent  Select this option to block wireless access by MAC Address. This button is selected by default.

Permit  Select this option to allow wireless access by MAC Address. This button is not selected by default.

MAC Address Filter List

Wireless Client List  Click this button to open the Wireless Client List screen.

Wireless-N Home Router

14

Image 18
Contents Wireless-N Home Router Icon Descriptions Online ResourcesCopyright and Trademarks Table of Contents Warranty Information Appendix D Regulatory InformationAppendix E Software End User License Agreement Horizontal Placement Front PanelBack Panel Wall-Mounting Placement Suggested Mounting HardwareGeneral Network Security Guidelines Additional Security TipsInternet Setup Access the Browser-Based UtilitySetup Basic Setup LanguagePPPoE Automatic Configuration DhcpStatic IP PptpOptional Settings L2TPTelstra Cable Router IP Network SetupDhcp Server Setting Dhcp ReservationDdns Service Setup DdnsTime Settings DynDNS.orgMAC Address Clone Setup MAC Address CloneSetup Advanced Routing Advanced RoutingWireless Basic Wireless Settings Basic Wireless Settings ManualRouting Table Wi-Fi Protected Setup Method #1Method #2 Security Mode Wireless Wireless SecurityWireless Security Method #3WPA Enterprise WPA2 EnterpriseRadius Access Restriction Wireless Wireless MAC FilterWireless MAC Filter MAC Address Filter ListAdvanced Wireless Wireless Client ListInternet Filter Security FirewallFirewall Web FilterVPN Passthrough Internet Access PolicySecurity VPN Passthrough SummarySummary Single Port Forwarding Applications and Gaming Single Port ForwardingApplications and Gaming Port Range Forwarding Port Range ForwardingApplications & Gaming Port Range Triggering Applications and Gaming DMZPort Range Triggering QoS Quality of Service Applications and Gaming QoSEthernet Port Online GamesMAC Address Voice DeviceLocal Management Access Administration ManagementRouter Access Remote Management AccessSystem Reboot Administration LogAdministration Diagnostics LogDiagnostics Administration Factory DefaultsAdministration Firmware Upgrade Factory DefaultsStatus Router Status Local NetworkStatus Wireless Network Wireless NetworkAppendix a Troubleshooting Troubleshooting Appendix B Specifications Limited Warranty Obtaining Warranty ServiceExclusions and Limitations Technical Support GeneralSafety Notices FCC StatementFCC Radiation Exposure Statement Wireless Disclaimer Industry Canada StatementAvis d’Industrie Canada Изисквания Приложими Wireless Equipment Wireless-N/G/A/B Products CE MarkingNational Restrictions GHz Restrictions Product Usage RestrictionsItaly Latvia Third-Party Software or FirmwareDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Cisco Products Software LicensesSchedule Cisco Software License Agreement Software End User License Agreement Software End User License Agreement Schedule 3-A Schedule Network Magic FeaturesSchedule Open Source and Third Party Licenses GNU General Public LicensePreamble Software End User License Agreement No Warranty Schedule 3-BEND of Schedule 3-A GNU Lesser General Public License Software End User License Agreement Software End User License Agreement Software End User License Agreement Schedule 3-C END of Schedule 3-BOpenSSL License Original SSLeay LicenseEND of Schedule 3-C