Page 131 / 178 Scroll up to view Page 126 - 130
Page 132 / 178
Back to Contents Page
Managing Your Router:
Dell™ TrueMobile™ 2300 Wireless Broadband Router User's
Guide
Overview
Setup Wizard
Control Utility
Web-based Configuration Tool
Overview
Your TrueMobile 2300 Wireless Broadband Router came with factory default settings that should work for the majority of the
network usage scenarios. However, there are cases where your network environment may require a different router
configuration.
Setup Wizard
:
Setup Wizard is a Windows-based software program included on your TrueMobile 2300 CD. You can use
this program to 1) install the router on your network and create an environment for multiple PCs to share Internet access, 2)
add additional computers to the network, and 3) provide links to the User's Guide and the
Dell support website
.
Control Utility
:
Control Utility is another Windows-based software program included on your TrueMobile 2300 CD. This utility
is usually installed at the end of the router installation. It provides you useful configuration tool to manage your Wireless
Broadband Router. Please refer to the section
Control Utility
for detailed information.
Web-based Configuration Tool
:
Web-Based Configuration Tool is for advanced configuration of the Wireless Broadband
Router. It is a tool provided inside the router which can be accessed via the web browser on your PC. This tool includes every
basic and advanced configuration option for the Wireless Broadband Router. For instance, you can allow other Internet users
to access a Web server hosted on your local private network, or disable your wireless network.
NOTE:
Setup Wizard
or
Control Utility
must be run on Windows 2000, and XP computers. Microsoft
Internet Explorer (4.0 or higher) or Netscape (4.0 or higher) must be used for the
web-based configuration
tool
Factory Default
Settings:
Dell pre-configures the Wireless Broadband Router with the following settings:
NOTE: If you lose track of the device settings, you can reset the router by pushing the reset button to
restore these settings back to your router.
Setting
Default
User Name
admin
Password
admin
Device Name
my router
IP Address
192.168.2.1
Page 133 / 178
Subnet Mask
255.255.255.0
10 Mbps Ethernet WAN IP
<
obtain from ISP via DHCP
>
WAN DHCP Client
Enabled
ESSID (wireless network name)
wireless
Channel
6
Encryption
No Encryption
DHCP Server
Enabled
NAT Routing
Enabled
Back to Contents Page
Page 134 / 178
Back to Contents Page
Wireless Networking Overview:
Dell™ TrueMobile™ 2300 Wireless Broadband Router User's
Guide
Wireless Local Area Network (WLAN)
Identifying a WLAN
Encryption
Automatic Rate Selection and Rate Scaling
Wireless Local Area Network (WLAN)
A
Local Area Network
(LAN) is a network in one location. Users at that location can share files, printers, and other services. In
a LAN, a networked computer that requests services is called a client. A
Wireless Local Area Network
(WLAN) is a type of LAN
that uses high frequency radio waves rather than wires to communicate and transmit data among the network clients and
devices. It is a flexible data communication system implemented as an extension to, or as an alternative for, a wired LAN.
In a WLAN, wireless adapters are installed in clients, also called wireless clients. The adapter allows the wireless client to
communicate with the WLAN without cables. Instead, wireless clients send and receive information through a path in the air
called a channel.
The standards for a WLAN are based on the IEEE 802.11b standard and proposed 802.11g standard. All Dell 802.11b/g-
compliant devices interoperate with other 802.11b/g -compliant wireless devices from other vendors. The WiFi certification logo
indicates that the wireless device has been tested by an independent organization.
A wireless client operates in either infrastructure mode or peer-to-peer mode.
Back to Top
Identifying a WLAN
An ESSID and BSSID are both
Service Set Identifiers
(SSID) that identify and control the wireless client’s access to a given
WLAN. The SSID is sometimes referred to as the network name. The SSID indicates what WLAN you are referring to. In most
cases, the user interface displays the SSID.
When installing an access point or wireless adapter in a wireless client, the installation program asks you to enter the SSID.
Dell cannot provide you with this information, as it is specific to your network; although, you may choose to use the default
SSID, "wireless", for your Wireless Broadband Router. All wireless clients and access points in a WLAN must use the same
network name.
Back to Top
Encryption
In a WLAN, wireless clients and access points send and receive information through the air. Without implementing security, it is
possible for an unauthorized person to intercept the information.
A common way of implementing security and protecting information is
encryption
. Encryption applies a set of instructions, called
an
algorithm
, to information. The instructions combine the
plain
or
clear
text of information with a sequence of hexadecimal
Page 135 / 178
numbers, called an
encryption key
.
Before transmitting information over the airwaves, the wireless client or access point
encrypts
or scrambles the information.
The access point or wireless client receiving the information uses the same key to
decrypt
or unscramble the information. The
information is only readable to WLAN devices that have the correct encryption key. The longer the key is, the stronger the
encryption.
TrueMobile 2300 supports both WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access).
WEP
WEP provides a way of creating an encrypted key that is shared between a wireless client (such as a notebook with a wireless
PC card) and the router. In Wireless Broadband Router, WEP is an optional feature that can be enabled or disabled. When
WEP encryption is enabled, you must set the WEP key in the client to match the WEP key used by the access point because
you can ONLY connect to access points that have a matching WEP Key.
Note: It is better to change keys frequently. The same algorithm is used for all the communications that should be
protected. If the same key is used, the same message will give exactly the same cipher text. Then, it will be possible
for an eavesdropper to break the encrypted data. For this reason, it is strongly recommended to change keys often.
There are two WEP encryption methods:
40(64)-bit Encryption
104(128)-bit Encryption
40-bit and 64-bit encryption are identical. Some vendors use the term 40-bit; others use 64-bit. A wireless device that claims to
have 40-bit encryption interoperates with a device that claims to have 64-bit encryption, and vice versa. A 40(64)-bit key
consists of 10 hexadecimal numbers, arrayed as follows:
Key #1: 1011121314
Key #2: 2021222324
Key #3: 3031323334
Key #4: 4041424344
A 104(128)-bit key has several trillion times as many possible combinations than a 40(64)-bit key. It consists of 26 hexadecimal
numbers, arrayed as follows:
Key (#1): 101112131415161718191A1B1C
All wireless clients and access points in a WLAN must use the same encryption method and key. The following two examples
stress how important this point is.
Example 1
The encryption method for an access point is 40(64)-bit. The method for a wireless client is 104(128)-bit encryption. The client
and access point cannot communicate with each other, even though the selected key is the same. To resolve this problem, set
the access point to use 104(128)-bit encryption.
Example 2
The encryption method is the same for the access point and wireless client. You select key 1 for the access point and key 2
for the wireless client. The wireless client cannot communicate with the WLAN. To resolve this problem, select key 1 for the
wireless client.
CAUTION: Use the same key and encryption method for the wireless devices in the WLAN. Otherwise, they
cannot communicate with each other.
The Wireless Broadband Router uses either hexadecimal digits or ASCII characters to create encryption keys. Hexadecimal
digits include the numbers 0 to 9 and the letters A to F. For example, the decimal number 15 is represented as F in the
hexadecimal numbering system.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top