Configuring Wep Wireless Security - NETGEAR WIRELESS-G ROUTER WGR614V10 Reference Manual

Wireless-g router
Hide thumbs Also See for WIRELESS-G ROUTER WGR614V10:
Table of Contents

Advertisement

Name (SSID). The SSID is also known as the wireless network name. Enter a value of up to
32 alphanumeric characters. When more than one wireless network is active, different wireless
network names provide a way to separate the traffic. For a wireless device to participate in a
particular wireless network, it must be configured with the SSID for that network. The
WGR614v10 default SSID is NETGEAR. You can disable this broadcast as described in
"Viewing Advanced Wireless Settings" on page
Region. This field identifies the region where the Wireless-G Router can be used. It might not
be legal to operate the wireless features of the wireless router in a region other than one of
those identified in this field.
Note: The region selection feature might not be available in all countries.
Channel. This field determines which operating frequency is used. It should not be necessary
to change the wireless channel unless you notice interference problems with another nearby
wireless network. The wireless router uses channel bonding technology to extend the
bandwidth for data transmission. For more information about the wireless channel
frequencies, see the online document that you can access from
in Appendix
B.
Mode. This field determines which data communications protocol is used. You can choose
from: b and g; or g only.
Security Options. The selection of wireless security options can significantly affect your
network performance. The time it takes to establish a wireless connection can vary depending
on both your security settings and router placement.
WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-
PSK encryption can consume more battery power on a notebook computer, and can cause
significant performance degradation with a slow computer. Instructions for configuring the
security options can be found in
explanation of wireless security standards is available in the online document that you can
access from
"Wireless Networking Basics" in Appendix
3. Click Apply to save your settings.

Configuring WEP Wireless Security

WEP Shared Key authentication and WEP data encryption can be defeated by a determined
eavesdropper using publicly available tools.
Safeguarding Your Network
Wireless-G Router WGR614v10 Reference Manual
2-10.
"Choosing Appropriate Wireless Security" on page
v1.0, February 2010
"Wireless Networking Basics"
B.
2-1. A full
2-7

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents