Page 41 / 172 Scroll up to view Page 36 - 40
Wireless Configuration
4-1
June 2004 202-10036-01
Chapter 4
Wireless Configuration
This chapter describes how to configure the wireless features of your WGR614 v5 router. In
planning your wireless network, you should consider the level of security required. You should
also select the physical placement of your firewall in order to maximize the network speed. For
further information on wireless networking, refer to
Appendix D, “Wireless Networking Basics
.
Observe Performance, Placement, and Range Guidelines
The operating distance or range of your wireless connection can vary significantly based on the
physical placement of the wireless firewall. The latency, data throughput performance, and
notebook power consumption of wireless adapters also vary depending on your configuration
choices.
For best results, place your firewall:
Near the center of the area in which your computers will operate.
In an elevated location such as a high shelf where the wirelessly connected computers have
line-of-sight access (even if through walls).
Away from sources of interference, such as computers, microwaves, and 2.4 GHz cordless
phones.
Away from large metal surfaces.
The time it takes to establish a wireless connection can vary depending on both your security
settings and placement. WEP connections can take slightly longer to establish. Also, WEP
encryption can consume more battery power on a notebook computer.
Note:
Failure to follow these guidelines can result in significant performance
degradation or inability to wirelessly connect to the router. For complete range/
performance specifications, please see
Appendix A, “Technical Specifications
.”
Page 42 / 172
Reference Manual for the 54 Mbps Wireless Router WGR614 v5
4-2
Wireless Configuration
June 2004 202-10036-01
Implement Appropriate Wireless Security
Unlike wired network data, your wireless data transmissions can be received well beyond your
walls by anyone with a compatible adapter. For this reason, use the security features of your
wireless equipment. The WGR614 v5 router provides highly effective security features which are
covered in detail in this chapter. Deploy the security features appropriate to your needs.
Figure 4-1:
WGR614 v5 wireless data security options
There are several ways you can enhance the security of your wireless network.
Restrict Access Based on MAC address.
You can restrict access to only trusted computers so
that unknown computers cannot wirelessly connect to the WGR614 v5. MAC address filtering
adds an obstacle against unwanted access to your network, but the data broadcast over the
wireless link is fully exposed.
Turn Off the Broadcast of the Wireless Network Name SSID.
If you disable broadcast of
the SSID, only devices that have the correct SSID can connect. This nullifies the wireless
network ‘discovery’ feature of some products such as Windows XP, but the data is still fully
exposed to a determined snoop using specialized test equipment like wireless sniffers.
WEP.
Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared
Key authentication and WEP data encryption will block all but the most determined
eavesdropper.
Note:
Indoors, computers can connect over 802.11b/g wireless networks at ranges of up
to 300 feet. Such distances can allow for others outside of your immediate area to access
your network.
###<LUHOHVV#'DWD
:HFXULW\#2SWLRQV
9DQJH=#XS#WR#633#IRRW#UDGLXV
4-#2SHQ#V\VWHP=#HDV\#EXW#QR#VHFXULW\
5-#1$&#DFFHVV#OLVW=#QR#GDWD#VHFXULW\
6-#:(3=#VHFXULW\#EXW#VRPH#SHUIRUPDQFH#LPSDFW
7-#:3$038.=#YHU\#VWURQJ#VHFXULW\#
WGR614 v5
Page 43 / 172
Reference Manual for the 54 Mbps Wireless Router WGR614 v5
Wireless Configuration
4-3
June 2004 202-10036-01
WPA-PSK.
Wi-Fi Protected Access (WPA) data encryption provides strong data security.
WPA-PSK will block eavesdropping. Because this is a new standard, wireless device driver
and software availability may be limited.
Turn Off the Wired LAN.
If you disable the wireless LAN, wireless devices cannot
communicate with the router at all. You might choose to turn off the wireless the LAN when
you are away and the others in the household all use wired connections.
Understanding Wireless Settings
To configure the Wireless settings of your firewall, click the Wireless link in the main menu of the
browser interface. The Wireless Settings menu will appear, as shown below.
Figure 4-2:
Wireless Settings menu
Name (SSID).
The SSID is also known as the wireless network name. Enter a value of up to
32 alphanumeric characters. In a setting where there is more than one wireless network,
different wireless network names provide a means for separating the traffic. Any device you
want to participate in a particular wireless network will need to use this SSID for that network.
The WGR614 v5 default SSID is:
NETGEAR
.
Region.
This field identifies the region where the WGR614 v5 can be used. It may not be legal
to operate the wireless features of the wireless router in a region other than one of those
identified in this field.
Page 44 / 172
Reference Manual for the 54 Mbps Wireless Router WGR614 v5
4-4
Wireless Configuration
June 2004 202-10036-01
Channel.
This field determines which operating frequency will be used. It should not be
necessary to change the wireless channel unless you notice interference problems with another
nearby access point. For more information on the wireless channel frequencies please refer to
“Wireless Channels” on page D-2
.
Mode.
This field determines which data communications protocol will be used. You can select
“g only,” “b only,” or “g and b.” “g only” dedicates the WGR614 v5 to communicating with
the higher bandwidth 802.11g wireless devices exclusively. “b only” dedicates the WGR614
v5 to communicating with the higher bandwidth 802.11b wireless devices exclusively. The “g
and b” mode provides backward compatibility with the slower 802.11b wireless devices while
still enabling 802.11g communications.
Security Options.
These options are the wireless security features you can enable. The table
below identifies the various basic wireless security options. A full explanation of these
standards is available in
Appendix D, “Wireless Networking Basics
.”
Table 4-1.
Basic Wireless Security Options
Field
Description
Automatic
No wireless security.
WEP
WEP offers the following options:
Open System
With Open Network Authentication and 64- or 128-bit WEP Data Encryption, the WGR614
v5
does
perform 64- or 128-bit data encryption but
does not
perform any authentication.
Shared Key
Shared Key authentication encrypts the SSID and data.
Choose the Encryption Strength (64- or 128-bit data encryption). Manually enter the key
values or enter a word or group of printable characters in the Passphrase box. Manually
entered keys
are
case sensitive but passphrase characters
are not
case sensitive.
Note
: Not all wireless adapter configuration utilities support passphrase key generation.
• Auto
WPA-PSK
WPA-Pre-shared Key
does
perform authentication, uses 128-bit data encryption and
dynamically changes the encryption keys making it nearly impossible to circumvent.
Enter a word or group of printable characters in the Password Phrase box. These characters
are
case sensitive.
Note
: Not all wireless adapter configuration utilities support WPA. Furthermore, client software
is required on the client. Windows XP and Windows 2000 with Service Pack 3 do include the
client software that supports WPA. Nevertheless, the wireless adapter hardware and driver
must also support WPA.
Page 45 / 172
Reference Manual for the 54 Mbps Wireless Router WGR614 v5
Wireless Configuration
4-5
June 2004 202-10036-01
To configure the advanced wireless settings of your firewall, click the Wireless Setup link in the
Advanced section of the main menu of the browser interface. The Wireless Settings menu will
appear, as shown below.
Figure 4-3:
Advanced Wireless Settings menu
Allow Broadcast of Name (SSID).
If you disable broadcast of the SSID, only devices that
have the correct SSID can connect. Disabling SSID broadcast nullifies the wireless network
‘discovery’ feature of some products such as Windows XP.
Enable Wireless Access Point.
If you disable the wireless access point, wireless devices
cannot connect to the WGR614 v5.
Wireless Card Access List.
When the Trusted PCs Only radio button is selected, the
WGR614 v5 checks the MAC address of the wireless station and only allows connections to
computers identified on the trusted computers list.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top