ActionTec GT724WGR User Manual page 22

Wireless dsl modem
Hide thumbs Also See for GT724WGR:
Table of Contents

Advertisement

Chapter 4 Configuring Wireless Settings
WEP
Selecting WEP in the Wireless Advanced Settings screen generates the "WEP Key"
screen. Here, the authentication type, encryption level, and WEP keys are entered
to activate WEP (Wired Equivalent Privacy) security encryption for the wireless
network.
Authentication Type - There are three authentication types: Open, Shared, and
Both. Open authenticaton allows any wireless-enabled device to recognize the
network, even if the
key is invalid. Shared allows only wireless-enabled
WEP
devices with the correct WEP key to recognize the network.
64-bit
- 64-bit
requires one or more keys, each key comprising
hexa-
WEP
WEP
five
decimal pairs. One key (Key 1) is automatically generated by the Modem at start-
up, based on the Modem's MAC address. This key is also displayed on a sticker
on the bottom of the Modem. A hexadecimal digit consists of an alphanumeric
character ranging from 0-9 or A-F. An example of a 64-bit WEP key is: 4E-A3-
3D-68-72. To create a new set of 64-bit WEP keys, activate one or more keys by
clicking in the appropriate circles, then enter five hexadecimal digit pairs in each
activated Key text box (Key 1-, Key 2-, Key 3-, Key 4-). After activating 64-bit
WEP, a computer with wireless capability can join the network only if these same
keys are entered in the computer's wireless encryption scheme.
128-bit
128-bit WEP requires one or more keys, each key comprising
hexa-
WEP-
13
decimal pairs. A hexadecimal digit consists of an alphanumeric character ranging
from 0-9 or
. An example of a 128-bit WEP key is: 3D-44-FE-6C-A1-EF-2E-
A-F
D3-C4-21-74-5D-B1. To create a 128-bit WEP key, activate Key 1 by clicking in
the appropriate circle, select "128 bit" from the drop-down list on the right, then
enter 13 hexadecimal digit pairs in the Key text box. After activating 128-bit , a
computer with wireless capability can join the network only if this key is entered
in the computer's wireless encryption scheme.
19

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents