Reference Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V
•Channel. This field determines which operating frequency will be used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby access point.
•Mode. This field determines which data communications protocol will be used.
•Security Options. These options are the wireless security features you can enable. The table below identifies the various basic wireless security options.
Table | Basic Wireless Security Options |
|
|
Field | Description |
|
|
Disable | No wireless security. |
|
|
WEP | WEP offers the following options: |
| Open System |
| With Open Network Authentication and 64- or |
| does perform 64- or |
| Shared Key |
| Shared Key authentication encrypts the SSID and data. |
| Choose the Encryption Strength (64- or |
| values or enter a word or group of printable characters in the Passphrase box. Manually |
| entered keys are case sensitive but passphrase characters are not case sensitive. |
| Note: Not all wireless adapter configuration utilities support passphrase key generation. |
| Auto |
| |
| dynamically changes the encryption keys making it nearly impossible to circumvent. |
| Enter a word or group of printable characters in the Password Phrase box. These characters |
| are case sensitive. |
| Note: Not all wireless adapter configuration utilities support WPA. Furthermore, client software |
| is required on the client. Windows XP and Windows 2000 with Service Pack 3 do include the |
| client software that supports WPA. Nevertheless, the wireless adapter hardware and driver |
| must also support WPA. |
•Allow Broadcast of Name (SSID). If you disable broadcast of the SSID, only devices that have the correct SSID can connect. Disabling SSID broadcast nullifies the wireless network ‘discovery’ feature of some products such as Windows XP.
•Enable Wireless Access Point. If you disable the wireless access point, wireless devices cannot connect to the WGR826V.
Optimizing Wireless Connectivity and Security |