Page 36 / 92 Scroll up to view Page 31 - 35
34
Manually Configuring your Router
Wireless
The “Wireless” tab lets you make changes to the wireless network settings. From
this tab, you can make changes to the wireless network name (SSID), operating
channel, and encryption security settings.
Channel and SSID
1. Changing the Wireless Channel
There are a number of operating channels you can choose from. In the United
States, there are 11 channels. In the United Kingdom and most of Europe, there
are 13 channels. In a small number of other countries, there are other channel
requirements. Your Router is configured to operate on the proper channels for
the country you reside in. The default channel is 11 (unless you are in a country
that does not allow channel 11). The channel can be changed if needed. If there
are other wireless networks operating in your area, your network should be set to
operate on a channel that is different than the other wireless networks. For best
performance, use a channel that is at least five channels away from the other
wireless networks. For instance, if another network is operating on channel 11, then
set your network to channel 6 or below. To change the channel, select the channel
from the drop-down list. Click “Apply Changes”. The change is immediate.
(1)
(2)
Page 37 / 92
Manually Configuring your Router
35
section
2
1
3
4
5
6
7
8
9
10
11
12
2. Changing the Wireless Network Name (SSID)
To identify your wireless network, a name called the SSID (Service Set Identifier)
is used. The default SSID of the Router is “belkin54g”. You can change this to
anything you want to or you can leave it unchanged. If there are other wireless
networks operating in your area, you will want to make sure that your SSID is
unique (does not match that of another wireless network in the area). To change
the SSID, type in the SSID that you want to use in the SSID field
(1)
and click
“Apply Changes”
(2)
. The change is immediate. If you make a change to the
SSID, your wireless-equipped computers may also need to be reconfigured to
connect to your new network name. Refer to the documentation of your wireless
network adapter for information on making this change.
3. Using the ESSID Broadcast Feature
For security purposes, you can choose not to broadcast your network’s SSID.
Doing so will keep your network name hidden from computers that are scanning
for the presence of wireless networks. To turn off the broadcast of the SSID,
remove the tick from the tick box next to the option, Broadcast SSID. The change
is immediate. Each computer now needs to be set to connect to your specific
SSID; an SSID of “ANY” will no longer be accepted. Refer to the documentation
of your wireless network adapter for information on making this change.
Note:
This advanced feature should be employed by advanced users only.
Page 38 / 92
36
Manually Configuring your Router
4. Using the Wireless Mode Switch
Your router can operate in either two different wireless modes:
802.11b & 802.11g-
Choose this option if you plan to have wireless clients
of both 802.11b and 802.11g connect to your network.
802.11g -
Use this mode if there are no 802.11b clients in the network.
This option gives the best performance but will not allow 802.11b clients to
connect.
5. Protected Mode Switch
As part of the 802.11g specification, Protected mode ensures proper
operation of 802.11g clients and access points when there is heavy
802.11b traffic in the operating environment. When Protected mode
is ON, 802.11g scans for other wireless network traffic before it
transmits data. Therefore, using this mode in environments with
HEAVY 802.11b traffic or interference achieves best performance
results. If you are in an environment with very little—or no—wireless
network traffic, your best performance will be achieved with Protected
mode OFF.
Page 39 / 92
Manually Configuring your Router
37
section
2
1
3
4
5
6
7
8
9
10
11
12
Encryption/Security
Securing your Wi-Fi Network
Here are a few different ways you can maximize the security of your
wireless network and protect your data from prying eyes and ears.
This section is intended for the home, home office, and small office
user. At the time of this User Manual’s publication, there are four
encryption methods available.
Name
64-bit Wired
Equivalent
Privacy
128-bit Wired
Equivalent
Privacy
Wi-Fi Protected
Access-TKIP
Wi-Fi Protected
Access
Acronym
64-bit WEP
128-bit WEP
WPA-TKIP
WPA-AES
Security
Good
Better
Best
Best
Features
Static keys
Static keys
Dynamic key
encryption
and mutual
authentication.
Dynamic key
encryption
and mutual
authentication.
Encryption
keys based
on RC4
algorithm
(typically
40-bit keys)
More secure
than 64-bit
WEP using a
key length of
104 bits plus
24 additional
bits of system
generated
data.
TKIP (temporal
key integrity
protocol)
added so
that keys are
rotated and
encryption is
strengthened.
AES (Advanced
Encryption
Standard) does
not cause any
throughput
loss.
WEP (Wired Equivalent Privacy)
WEP is a common protocol that adds security to all Wi-Fi-compliant
wireless products. WEP was designed to give wireless networks the
equivalent level of privacy protection as a comparable wired network.
64-Bit WEP
64-bit WEP was first introduced with 64-bit encryption, which includes
a key length of 40 bits plus 24 additional bits of system-generated
data (64 bits total). Some hardware manufacturers refer to 64-bit
as 40-bit encryption. Shortly after the technology was introduced,
researchers found that 64-bit encryption was too easy to decode.
Page 40 / 92
38
Manually Configuring your Router
128-Bit WEP
As a result of 64-bit WEP’s potential security weaknesses, 128Bit
WEP was developed as a more secure method of encryption. 128-bit
encryption includes a key length of 104 bits plus 24 additional bits of
system-generated data (128 bits total). Some hardware manufacturers
refer to 128-bit as 104-bit encryption.
Most of the new wireless equipment in the market today supports
both 64-bit and 128-bit WEP encryption, but you might have older
equipment that only supports 64-bit WEP. All Belkin wireless products
will support both 64-bit and 128-bit WEP.
Encryption Keys
After selecting either the “64-bit” or “128-bit WEP” encryption mode,
it is critical that you generate an encryption key. If the encryption key
is not consistent throughout the entire wireless network, your wireless
networking devices will be unable to communicate with one another
on your network and you will not be able to successfully communicate
within your network.
You can enter your key by typing in the hex key manually, or you can
type in a passphrase in the “Passphrase” field and click “Generate”
to create a key. A hex (hexadecimal) key is a mixture of numbers and
letters from A–F and 0–9. For 64-bit WEP, you need to enter 10 hex
characters. For 128-bit WEP, you need to enter 26 hex characters.
For instance:
AF 0F 4B C3 D4
= 64-bit WEP key
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7
= 128-bit WEP key
The WEP passphrase is NOT the same as a WEP key. Your wireless
card uses this passphrase to generate your WEP keys, but different
hardware manufacturers might have different methods for generating
the keys. If you have equipment from multiple vendors in your
network, you can use the hex WEP key from your Router or access
point and enter it manually into the hex WEP key table in your
wireless card’s configuration screen.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top