Page 41 / 162 Scroll up to view Page 36 - 40
Wireless Configuration
4-1
202-10039-01
Chapter 4
Wireless Configuration
This chapter describes how to configure the wireless features of your MR814 v3 router. In
planning your wireless network, you should consider the level of security required. You should
also select the physical placement of your firewall in order to maximize the network speed. For
further information on wireless networking, refer to in
Appendix D, “Wireless Networking
Basics
.”
Observe Performance, Placement, and Range Guidelines
The operating distance or range of your wireless connection can vary significantly based on the
physical placement of the wireless firewall. The latency, data throughput performance, and
notebook power consumption also vary depending on your configuration choices.
For best results, place your firewall:
Near the center of the area in which your PCs will operate.
In an elevated location such as a high shelf where the wirelessly connected PCs have
line-of-sight access (even if through walls).
Away from sources of interference, such as PCs, microwaves, and 2.4 GHz cordless phones.
Away from large metal surfaces.
The time it takes to establish a wireless connection can vary depending on both your security
settings and placement. WEP connections can take slightly longer to establish. Also, WEP
encryption can consume more battery power on a notebook PC.
Note:
Failure to follow these guidelines can result in significant performance
degradation or inability to wirelessly connect to the router. For complete range/
performance specifications, please see
Appendix A, “Technical Specifications
.”
Page 42 / 162
Reference Manual for the MR814 v3 Cable/DSL Wireless Router
4-2
Wireless Configuration
202-10039-01
Implement Appropriate Wireless Security
Unlike wired network data, your wireless data transmissions can be received well beyond your
walls by anyone with a compatible adapter. For this reason, use the security features of your
wireless equipment. The MR814 v3 router provides highly effective security features which are
covered in detail in this chapter. Deploy the security features appropriate to your needs.
Figure 4-1:
MR814 v3 wireless data security options
There are several ways you can enhance the security of you wireless network.
Restrict Access Based on MAC Address.
You can restrict access to only trusted computers o
that unknown computers cannot wirelessly connect to the MR814 v3. MAC address filtering
adds an obstacle against unwanted access to your network, but the data broadcast over the
wireless link is fully exposed.
WEP.
Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared
Key authentication and WEP data encryption will block all but the most determined
eavesdropper.
WPA-PSK.
Wi-Fi Protected Access (WPA) data encryption provides strong data security.
WPA-PSK will block eavesdropping. Because this is a new standard, wireless device driver
and software availability may be limited.
Note:
Indoors, computers can connect over 802.11 wireless networks at ranges
of up to 300 feet.
Such distances can allow for others outside of your immediate area to
access your network.
###<LUHOHVV#'DWD
:HFXULW\#2SWLRQV
9DQJH=#XS#WR#633#IRRW#UDGLXV
4-#2SHQ#V\VWHP=#HDV\#EXW#QR#VHFXULW\
5-#1$&#DFFHVV#OLVW=#QR#GDWD#VHFXULW\
6-#:(3=#VHFXULW\#EXW#VRPH#SHUIRUPDQFH#LPSDFW
7-#:3$038.=#YHU\#VWURQJ#VHFXULW\#
MR814 v3
Page 43 / 162
Reference Manual for the MR814 v3 Cable/DSL Wireless Router
Wireless Configuration
4-3
202-10039-01
Turn Off the Wireless LAN.
If you disable the wireless LAN, wireless devices cannot
communicate with the router at all. You might choose to turn off the wireless the LAN when
you are away and the others in the household all use wired connections.
Turn Off the Broadcast of the Wireless Network Name SSID.
If you disable broadcast of
the SSID, only devices that have the correct SSID can connect. This nullifies the wireless
network ‘discovery’ feature of some products such as Windows XP, but the data is still fully
exposed to a determined snoop using specialized test equipment like wireless sniffers.
Understanding Wireless Settings
This section identifies the default factory settings and introduces each wireless option.
Default Factory Settings
When you first receive your MR814 v3, the default factory settings are shown below. You can
restore these defaults with the Factory Default Restore button on the rear panel. After you install
the MR814 v3 router, use the procedures below to customize any of the settings to better meet
your networking needs.
Basic Wireless Settings
To configure the wireless settings of your router, click the Wireless link in the main menu of the
browser interface. The Wireless Settings menu will appear, as shown below.
FEATURE
DEFAULT FACTORY SETTINGS
Wireless Access Point
Enabled
Wireless Access List (MAC Filtering)
All wireless stations allowed
SSID broadcast
Enabled
SSID
NETGEAR
11b RF Channel
11
Authentication Type
Automatic
Wireless Security Options
Disabled
Page 44 / 162
Reference Manual for the MR814 v3 Cable/DSL Wireless Router
4-4
Wireless Configuration
202-10039-01
Figure 4-2:
Wireless Settings menu
Name (SSID).
The SSID is also known as the wireless network name. Enter a value of up to
32 alphanumeric characters. In a setting where there is more than one wireless network,
different wireless network names provide a means for separating the traffic. Any device you
want to participate in a particular wireless network will need to use this SSID for that network.
The MR814 v3 default SSID is:
NETGEAR
.
Region.
This field identifies the region where the MR814 v3 can be used. It may not be legal
to operate the wireless features of the router in a region other than one of those identified in
this field.
Channel.
This field determines which operating frequency will be used. It should not be
necessary to change the wireless channel unless you notice interference problems with another
nearby access point. For more information on the wireless channel frequencies please refer to
“Wireless Channels” on page D-2
.
Security Options.
These options are the wireless security features you can enable. The table
below identifies the various basic wireless security options. A full explanation of these
standards is available in
Appendix D, “Wireless Networking Basics
.
Page 45 / 162
Reference Manual for the MR814 v3 Cable/DSL Wireless Router
Wireless Configuration
4-5
202-10039-01
Table 4-1.
Security Options
Field
Description
Disable
No wireless security.
WEP
WEP offers the following options:
• Automatic
Normally, this can be left to the default setting of automatic. When set to Automatic, the
MR814 v3 will make a best effort attempt to use whatever options the wireless station is
using. If this fails, you may need to configure this setting so that the MR814 v3 router and
wireless stations match.
Open System
With Open Network Authentication and 64- or 128-bit WEP Data Encryption, the MR814 v3
does
perform 64- or 128-bit data encryption but
does not
perform any authentication.
Shared Key
Shared Key authentication encrypts the SSID and data.
Choose the Encryption Strength (64- or 128-bit data encryption). Manually enter the key
values or enter a word or group of printable characters in the Passphrase box. Manually
entered keys
are
case sensitive but passphrase characters
are not
case sensitive.
Note
: Not all wireless adapter configuration utilities support WEP passphrase key
generation.
WPA-PSK
WPA-Pre-shared Key performs authentication, uses 128-bit data encryption, and dynamically
changes the encryption keys making it nearly impossible to circumvent.
• Passphrase
Enter a word or group of between 8-63 printable characters in the Passphrase box. These
characters
are
case sensitive.
Key Lifetime
This setting determines how often the encryption key is changed. Shorter periods provide
greater security, but adversely affect performance. If desired, you can change the default
value.
Note
: Not all wireless adapter configuration utilities support WPA. Furthermore, client software
is required on the client. Windows XP and Windows 2000 with Service Pack 3 do include the
client software that supports WPA. Nevertheless, the wireless adapter hardware and driver
must also support WPA.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top