Page 26 / 86 Scroll up to view Page 21 - 25
20
Chapter 5: Configuring the Wireless-G Travel Router with SpeedBooster
The Wireless Tab - Basic Wireless Settings
Wireless-G Travel Router with SpeedBooster
SecureEasySetup Button
. The status of the Router’s SecureEasySetup feature is displayed here. If you want to
use the SecureEasySetup feature, click the
SecureEasySetup
button.
You will be asked to press the SecureEasySetup button (hardware or software) on your wireless client (computer
or other network device) within two minutes to complete the SecureEasySetup process. Click the
OK
button to
continue.
A new screen will be displayed while the Router is waiting for you to push the SecureEasySetup button on your
wireless client.
When the SecureEasySetup process is complete, the
Basic Wireless Settings
screen will appear, and the Current
Encryption and Status information will be updated.
Status
. The status of your wireless security is displayed here.
Reset Security
. If you already set up the network using the SecureEasySetup feature and you want to replace
your current settings with new SecureEasySetup settings, click the
Reset Security
button. A new screen will
appear. You will be asked to confirm that you want to reset your wireless security settings. Click the
OK
button to
continue.
The Router will generate a new network name (SSID) and set of keys.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes. Help information is shown on the right-hand side of the screen.
Downloaded from
www.Manualslib.com
manuals search engine
Page 27 / 86
21
Chapter 5: Configuring the Wireless-G Travel Router with SpeedBooster
The Wireless Tab - Wireless Security
Wireless-G Travel Router with SpeedBooster
The Wireless Tab - Wireless Security
The Wireless Security settings configure the security of your wireless network. There are four wireless security
mode options supported by the Router: WPA Personal, WPA2-Personal, WPA2-Mixed, and WEP. (WEP stands for
Wired Equivalent Privacy). These four are briefly discussed here. For detailed instructions on configuring wireless
security for the Router, turn to “Appendix B: Wireless Security.”
When finished making your changes on this tab, click the
Save Settings
button to save these changes, or click
the
Cancel Changes
button to undo your changes.
Wireless Security
WEP
. WEP is a basic encryption method. Select a level of WEP encryption,
40/64-bit Hex digits
or
128-bit Hex
digits
. If you want to use a Passphrase, then enter it in the
Passphrase
field and click the
Generate
button. If you
want to enter the WEP key manually, then enter it in the
WEP Key 1-4
field(s). To indicate which WEP key to use,
select the appropriate
TX Key
number.
Passphrase. Instead of manually entering WEP keys, you can enter a passphrase. It is used to generate one or
more WEP keys. It is case-sensitive and should not be longer than 32 alphanumeric characters. (This
Passphrase function is compatible with Linksys wireless products only. If you want to communicate with non-
Linksys wireless products, make a note of the WEP key generated in the Key 1 field, and enter it manually in
the wireless client.) After you enter the Passphrase, click the
Generate
button to create WEP keys.
TX Key
Select which WEP key (1-4) will be used when the Router sends data. Make sure that the receiving
device (wireless client) is using the same key.
WEP Keys 1-4. WEP keys enable you to create an encryption scheme for wireless network transmissions. If
you are not using a Passphrase, then manually enter a set of values. (Do not leave a key field blank, and do
not enter all zeroes; they are not valid key values.) If you are using 64-bit WEP encryption, the key must be
exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, the key must be exactly
26 hexadecimal characters in length. Valid hexadecimal characters are “0”-“9” and “A”-“F”.
WPA-Personal
. This method offers two encryption methods, TKIP and AES, with dynamic encryption keys. Select
the type of encryption method you want to use,
TKIP
or
AES
. Enter the Passphrase, which can have 8 to 63
characters. Then enter the Key Renewal period, which instructs the Router how often it should change the
encryption keys.
Figure 5-18: Wireless Tab - Wireless Security
(WEP)
Figure 5-19: Wireless Tab - Wireless Security
(WPA Personal)
wep
(wired equivalent privacy): a method of
encrypting network data transmitted on a
wireless network for greater security.
IMPORTANT:
If you are using encryption,
always remember that each device in your
wireless network MUST use the same
encryption method and encryption key, or else
your wireless network will not function properly.
Downloaded from
www.Manualslib.com
manuals search engine
Page 28 / 86
22
Chapter 5: Configuring the Wireless-G Travel Router with SpeedBooster
The Wireless Tab - Wireless Security
Wireless-G Travel Router with SpeedBooster
Figure 5-21: Wireless Tab - Wireless Security (WPA2-Mixed)
WPA2-Personal
. WPA2-Personal gives you one encryption method, AES, with dynamic encryption keys. Enter a
Passphrase of 8-63 characters. Then enter a Key Renewal period, which instructs the Router how often it should
change the encryption keys.
WPA2-Mixed
. WPA2-Mixed gives you TKIP+AES encryption. Enter a Passphrase of 8-63 characters. Then enter a
Key Renewal period, which instructs the Router how often it should change the encryption keys.
Figure 5-20: Wireless Tab - Wireless Security
(WPA2-Personal)
Downloaded from
www.Manualslib.com
manuals search engine
Page 29 / 86
23
Chapter 5: Configuring the Wireless-G Travel Router with SpeedBooster
The Wireless Tab - Wireless MAC Filter
Wireless-G Travel Router with SpeedBooster
The Wireless Tab - Wireless MAC Filter
Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your
network’s radius.
Wireless MAC Filter
To filter wireless users by MAC Address, either permitting or blocking access, click
Enabled
. If you do not wish to
filter users by MAC Address, select
Disabled
.
Access Restriction
Prevent ONLY PCs listed below to access the wireless network
. Clicking this radio button will block wireless
access by MAC Address.
Permit ONLY PCs listed below to access the wireless network
. Clicking this radio button will allow wireless
access by MAC Address.
Wireless Client List
Wireless Client List
. Click the
Wireless Client MAC List
button to display a list of network users by MAC
Address. From the
To Sort by
drop-down menu, you can sort the table by Client Name, IP Address, MAC Address,
or Expires. To view the most up-to-date information, click the
Refresh
button. To exit this screen, click the
Close
button.
Change these settings as described here and click the
Save Settings
button to apply your changes or
Cancel
Changes
to cancel your changes. Help information is shown on the right-hand side of the screen.
Figure 5-22: Wireless Tab - Wireless MAC Filter
Figure 5-23: Wireless Tab - Wireless Client List
Downloaded from
www.Manualslib.com
manuals search engine
Page 30 / 86
24
Chapter 5: Configuring the Wireless-G Travel Router with SpeedBooster
The Wireless Tab - Advanced Wireless Settings
Wireless-G Travel Router with SpeedBooster
The Wireless Tab - Advanced Wireless Settings
This tab is used to set up the Router’s advanced wireless functions. These settings should only be adjusted by an
expert administrator as incorrect settings can reduce wireless performance.
Advanced Wireless
Frame Burst Mode
. Enabling this option should provide your network with greater performance, depending on
the manufacturer of your wireless products. If you are not sure how to use this option, keep the default,
Enabled
(Default)
.
AP Isolation
. This isolates all wireless clients and wireless devices on your network from each other. Wireless
devices will be able to communicate with the Router but not with each other. To use this function, click
Enabled
.
AP Isolation is disabled by default.
Authentication Type
. The default is set to
Open System
, allows either Open System or Shared Key
authentication to be used. With
Open System
authentication, the sender and the recipient do NOT use a WEP key
for authentication. With
Shared Key
authentication, the sender and recipient use a WEP key for authentication.
Basic Rate
. The Basic Rate setting is not actually one rate of transmission but a series of rates at which the
Router can transmit. The Router will advertise its Basic Rate to the other wireless devices in your network, so
they know which rates will be used. The Router will also advertise that it will automatically select the best rate
for transmission. The default setting is
Default
, when the Router can transmit at all standard wireless rates
(1-2Mbps, 5.5Mbps, 11Mbps, 18Mbps, and 24Mbps). Other options are
1-2Mbps
, for use with older wireless
technology, and
All
, when the Router can transmit at all wireless rates. The Basic Rate is not the actual rate of
data transmission. If you want to specify the Router’s rate of data transmission, configure the Transmission Rate
setting.
Transmission Rate
. The rate of data transmission should be set depending on the speed of your wireless
network. You can select from a range of transmission speeds, or you can select
Auto (Default)
to have the
Router automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will
negotiate the best possible connection speed between the Router and a wireless client. The default value is
Auto
(Default)
.
CTS Protection Mode
. CTS (Clear-To-Send) Protection Mode should be set to
Auto
(Default)
. The Router will
automatically use CTS Protection Mode when your Wireless-G products are experiencing severe problems and
are not able to transmit to the Router in an environment with heavy 802.11b traffic. This function boosts the
Router’s ability to catch all Wireless-G transmissions but will severely decrease performance.
Beacon Interval
. The default value is
100
. The Beacon Interval value indicates the frequency interval of the
beacon. A beacon is a packet broadcast by the Router to synchronize the wireless network.
Figure 5-24: Wireless Tab - Advanced Wireless
Settings
cts
(clear to send): a signal sent by a wireless
device, signifying that it is ready to receive data.
dtim
: a message included in data packets
that can increase wireless efficiency.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top