Page 56 / 98 Scroll up to view Page 51 - 55
Using the Web-Based Advanced User Interface
52
Guest Access (Optional)
The guest pre-shared key allows guest users an Internet-only access to
restrict them from entering your network and having access to files on
your PCs. Enter your pre-shared key for guest access. This can be from
eight to 63 characters and can be letters, numbers, or symbols. Click
“Apply Changes” to finish.
Setting up WPA for Wireless Desktop and Wireless Notebook Cards
that are NOT MyEssentials
If you do NOT have a MyEssentials WPA Wireless Desktop or Wireless
Notebook Card and it is not equipped with WPA-enabled software, a file
from Microsoft called “Windows XP Support Patch for Wireless Protected
Access” is available for free download.
Please Note:
The file that Microsoft has made available works only with
Windows XP. Other operating systems are not supported at this time.
Important:
You also need to ensure that the wireless card manufacturer
supports WPA and that you have downloaded and installed the latest
driver from their support site.
Supported Operating Systems:
• Windows XP Professional
• Windows XP Home Edition
Downloaded from
www.Manualslib.com
manuals search engine
Page 57 / 98
53
2
1
3
4
5
6
section
Using the Web-Based Advanced User Interface
7
8
9
10
Setting up Windows XP Wireless Network Utility to use WPA-PSK
In order to use WPA-PSK, ensure you are using the Windows Wireless
Network Utility by doing the following:
1.
Under Windows XP, click “Start > Control Panel > Network Connections”.
2.
Right-click on “Wireless Network Connection Properties”
and select “Properties”.
3.
Clicking on the “Wireless Networks” tab will display the following
screen. Ensure the “Use Windows to configure my wireless network
settings” box is checked.
Downloaded from
www.Manualslib.com
manuals search engine
Page 58 / 98
Using the Web-Based Advanced User Interface
54
4.
Under the “Wireless Networks” tab, click the “Configure” button
and you will see the following screen.
5.
For a home or small business user, select “WPA-PSK” under
“Network Authentication”.
Note:
Select “WPA” if you are using this computer to connect to a
corporate network that supports an authentication server such as a radius
server. Please consult your network administrator for further information.
6.
Select “TKIP” or “AES” under “Data Encryption”. This setting will have
to be identical to the Router that you set up.
7.
Type in your encryption key in the “Network key” box.
Important:
Enter your pre-shared key. This can be from eight to 63
characters and can be letters, numbers, or symbols. This same key
must be used on all of the clients that you set up.
8.
Click “OK” to apply settings.
Downloaded from
www.Manualslib.com
manuals search engine
Page 59 / 98
55
2
1
3
4
5
6
section
Using the Web-Based Advanced User Interface
7
8
9
10
Using the Access Point Mode
Note:
This advanced feature should be employed by advanced users
only. The Router can be configured to work as a wireless network access
point. Using this mode will defeat the NAT IP sharing feature and DHCP
server. In Access Point (AP) mode, the Router will need to be configured
with an IP address that is in the same subnet as the rest of the network
that you will bridge to. The default IP address is 192.168.2.254 and
subnet mask is 255.255.255.0. These can be customized for your need.
1.
Enable the AP mode my selecting “Enable” in the “Use as Access Point
only” page. When you select this option, you will be able to change the
IP settings.
2.
Set your IP settings to match your network. Click “Apply Changes”.
3.
Connect a cable from the “Modem” port on the Router to your
existing network.
The Router is now acting as an access point. To access the Router’s
Web-Based Advanced User Interface again, type the IP address you
specified into your browser’s navigation bar. You can set the encryption
settings, MAC address filtering, SSID, and channel normally.
Downloaded from
www.Manualslib.com
manuals search engine
Page 60 / 98
Using the Web-Based Advanced User Interface
56
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
• IP Spoofing
• SYN flood
• Land Attack
• UDP flooding
• Ping of Death (PoD)
• Tear Drop Attack
• Denial of Service (DoS)
• ICMP defect
• IP with zero length
• RIP defect
• Smurf Attack
• Fragment flooding
• TCP Null Scan
The firewall also masks common ports that are frequently used to attack
networks. These ports appear to be “Stealth”, meaning that for all intents
and purposes, they do not exist to a would-be hacker. You can turn the
firewall function off if needed; however, it is recommended that you leave
the firewall enabled. Disabling the firewall protection will not leave your
network completely vulnerable to hacker attacks, but it is recommended
that you leave the firewall enabled.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top