Page 41 / 79 Scroll up to view Page 36 - 40
41
D-Link DIR-450 User Manual
Section ² - Configuration
Log
First Page:
Last Page:
Previous:
Next:
Clear:
View the first page of the log.
View the last page of the log.
View the previous page.
View the next page.
Clear the log.
Page 42 / 79
D-Link DIR-450 User Manual
Section ² - Configuration
Stats
Wireless Stats
The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-450 on
both the WAN and the LAN ports. The traffic counter will reset if the device is rebooted.
The wireless client table displays a list of current connected wireless clients. This table also displays the connection
time and MAC address of the connected wireless client.
Page 43 / 79
D-Link DIR-450 User Manual
Section ² - Configuration
Support
Page 44 / 79
44
D-Link DIR-450 User Manual
Section 4 - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The
DIR-450 offers the following types of security:
• WPA2 (Wi-Fi Protected Access 2)
• WPA2-PSK (Pre-Shared Key)
• WPA (Wi-Fi Protected Access)
• WPA-PSK (Pre-Shared Key)
• WEP (Wired Equivalent Privacy)
What is WEP?
WEP stands for Wired Equivalent Privacy. It is based on the IEEE 802.11 standard and uses the RC4 encryption
algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted
from one wireless device to another.
To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using
WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption
requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using
characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters) format.
ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX
for use over the network. Four keys can be defined so that you can change keys easily.
Page 45 / 79
45
D-Link DIR-450 User Manual
Section 4 - Security
Configure WEP
It is recommended to enable encryption on your mobile router before your wireless network adapters. Please establish
wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to
the added overhead.
1.
Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1).
Click on
Wireless Settings
on the left side.
2. Next to
Security Mode
, select
Enable
WEP Security
.
3. Next to
Authentication
, select
Open
or
Shared Key
.
4. Select either
64-bit
or
128-bit
encryption from the drop-down
menu next to
WEP Encryption
.
5. Next to
Key Type
, select either
Hex
or
ASCII
.
Hex (recommended) - Letters A-F and numbers 0-9 are
valid.
ASCII - All numbers and letters are valid.
6. Next to
Key 1
, enter a WEP key that you create. Make sure
you enter this key exactly on all your wireless devices. You
may enter up to 4 different keys.
7. Click
Save Settings
to save your settings. If you are configuring the router with a wireless adapter, you will lose
connectivity until you enable WEP on your adapter and enter the same WEP key as you did on the router.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top