56
G Wireless Router
sectionstable of contents 12345 789106
UsInG THe Web-based adVanCed UseR InTeRfaCe
1� Wi-Fi Protected Setup ( WPS): Enabled or D isabled�
2� Personal Identification Number (PIN) Metho d: In this method, a
wireless client wishin g to access your n etwork must supp ly a 4- or
8-digit PIN to the Router� Af ter clicking “En roll”, you must star t the
WPS handshaking proce dure from the clie nt within two minu tes�
3� Router PIN: If an external r egistrar is availa ble, you may enter i n the
Router’s PIN to the registra r� Click “Generate New PIN” to change
the PIN from the default value� Click “Resto re Default PIN” to re set
the PIN value�
4� Push Button Configuration (PBC) Method: PBC is an alternate
method to connect to a W PS network� Click the “Start PBC” button
located on the WPS user interface page of your Router, and the n
initiate the PBC on the cli ent device� Alter natively, click the “St art
PBC” soft button to sta rt this proces s�
5� Manual Configuration Meth od: This section l ists the default se curity
settings if not using WPS�
The Router features WPA2, which is the seco nd generation of the WPA-
based 802�11i standard� It offers a h igher level of wire less security by
combining advanced net work authenticati on and stronger Advanced
Encryption Standard (AES) encryptio n methods�
WPa setup
Note: To use WPA security, all your clients must be u pgraded to
drivers and software that support i t� At the time of thi s User Manual’s
publication, a securit y patch download i s available, for fre e, from
Microsoft®� This patch works only with the Windo ws XP operating
system� You also need to downl oad the latest dri ver for your Belkin
Wireless G Desktop o r Notebook Networ k Card from the Be lkin support
site� Other operating s ystems are not sup ported at this t ime� Microsoft’s
patch only supports d evices with WPA-enab led drivers suc h as Belkin
802�11g products�
WPA uses a so-called pr e-shared key as the security key� A p re-shared
key is a password that is between eight an d 63 characters long� It can
be a combination of let ters, numbers, and other charac ters� Each clien t
uses the same key to acc ess the network� Typically, this mode will be
used in a home environm ent�
WPA2 is the second gene ration of WPA, offe ring a more advan ced
encryption technique over WPA�