Reference Manual for the MR814v2 Cable/DSL Wireless Router
Choosing Authentication and Security Encryption Methods
Figure 3-7: Encryption Strength
Restricting wireless access to your network prevents intruders from connecting to your network. However, the wireless data transmissions are still vulnerable to snooping. Using the WEB data encryption settings described below will prevent a determined intruder from eavesdropping on your wireless data communications. Also, if you are using the Internet for such activities as purchases or banking, those Internet sites use another level of highly secure encryption called SSL. You can tell if a web site is using SSL because the web address begins with HTTPS rather than HTTP.
Authentication Scheme Selection
The MR814v2 lets you select the following wireless authentication schemes.
•Automatic.
•Open System.
•Shared key.
Note: The authentication scheme is separate from the data encryption. You can choose an authentication scheme which requires a shared key but still leave the data transmissions unencrypted. If you require strong security, use both the Shared Key and WEP encryption settings.
Set your wireless adapter according to the authentication scheme you choose for the MR814v2 router. Please refer to “Authentication and WEP” on page
Encryption Strength Choices
Choose the encryption strength from the
Wireless Configuration |