Page 26 / 118 Scroll up to view Page 21 - 25
NETGEAR RangeMax™ NEXT Wireless Router WNR834B User Manual
2-12
Configuring Basic Connectivity
v1.2, January 2007
Channel
This field determines which operating frequency is used. It should not be necessary to change
the wireless channel unless you notice interference problems with another nearby wireless
network. For more information on the wireless channel frequencies, see
“Wireless
Communications” in Appendix B
.
Mode
This field determines which data communications protocol is used. You can choose from:
g only
Dedicates the WNR834B to communicating with the higher bandwidth 802.11g wireless
devices exclusively.
g and b
Provides backward compatibility with the slower 802.11b wireless devices while still
enabling 802.11g communications.
Up To 126 Mbps
Provides two transmission streams with different data on the same channel at the same
time.
Up To 240 Mbps
Uses channel expansion to achieve the 240 Mbps data rate. The WNR834B router will use
the channel you selected as the primary channel and expand to the secondary channel
(primary channel +4 or –4) to achieve a 40MHz frame-by-frame bandwidth. The
WNR834B router will detect channel usage and will disable frame-by-frame expansion if
the expansion would result in interference with the data transmission of other access
points or clients.
Security Options
The selection of wireless security options can significantly affect your network performance.
The time it takes to establish a wireless connection can vary depending on both your security
settings and router placement. WEP connections can take slightly longer to establish. Also,
WEP, WPA-PSK and WPA2-PSK encryption can consume more battery power on a notebook
computer, and can cause significant performance degradation with a slow computer.
Instructions for configuring the security options can be found in
“Choosing Appropriate
Wireless Security” on page 3-1
. A full explanation of wireless security standards is available
in
“Wireless Communications” in Appendix B
.
Note:
The maximum wireless signal rate is derived from the IEEE Standard 802.11
Specifications. Actual data throughput will vary. Network conditions and
environmental factors, including volume of network traffic, building materials
and construction, and network overhead, lower actual data throughput rate.
Page 27 / 118
NETGEAR RangeMax™ NEXT Wireless Router WNR834B User Manual
Configuring Basic Connectivity
2-13
v1.2, January 2007
Viewing the Advanced Wireless Settings
To view the advanced wireless settings:
From the main menu of the browser interface, under Advanced, click Wireless Settings.
The available settings in this menu are:
Enable Wireless Router Radio
If you disable the wireless router radio, wireless devices cannot connect to the WNR834B.
Enable SSID Broadcast
If you disable broadcast of the SSID, only devices that know the correct SSID can connect.
Disabling SSID broadcast nullifies the wireless network ‘discovery’ feature of some products,
such as Windows XP.
Automatically switch channels to avoid interference
Select this checkbox to have the WNR834B router periodically survey the wireless
environment to ensure that it is using the clearest channel. If a clearer channel is available, it
might automatically switch channels.
Figure 2-7
Note:
After the router switches channels, there could be a slight delay while your
wireless computers reconnect to the router. To avoid this possibility, leave this
checkbox unselected.
Page 28 / 118
NETGEAR RangeMax™ NEXT Wireless Router WNR834B User Manual
2-14
Configuring Basic Connectivity
v1.2, January 2007
Wireless Card Access List
When a Wireless Card Access List is configured and enabled, the WNR834B checks the MAC
address of any wireless device attempting a connection, and only allows connections to
computers identified on the trusted computers list. For instructions on configuring the
Wireless Card Access List, see
“Restricting Wireless Access by MAC Address” on page 3-12
.
Note:
The Fragmentation Threshold, CTS/RTS Threshold and Preamble Mode options
are reserved for wireless testing and advanced configuration only. Do not change
these settings.
Page 29 / 118
3-1
v1.2, January 2007
Chapter 3
Safeguarding Your Network
The RangeMax NEXT Wireless Router WNR834B provides highly effective security features
which are covered in detail in this chapter.
This chapter includes:
Choosing Appropriate Wireless Security
Configuring WEP Wireless Security
Configuring WPA-PSK or WPA2-PSK Wireless Security
Restricting Wireless Access by MAC Address
Changing the Administrator Password
Backing Up Your Configuration
Understanding Your Firewall
Choosing Appropriate Wireless Security
Unlike wired network data, anyone with a compatible adapter can receive your wireless data
transmissions well beyond your walls. Operating an unsecured wireless network creates an
opportunity for outsiders to eavesdrop on your network traffic or to enter your network to access
your computers and files. For this reason, use the security features of your wireless equipment.
Deploy the security features appropriate to your needs.
Note:
Indoors, computers can connect over 802.11b/g wireless networks at ranges of up
to 300 feet. Such distances can allow for others outside of your immediate area to
access your network.
Page 30 / 118
NETGEAR RangeMax™ NEXT Wireless Router WNR834B User Manual
3-2
Safeguarding Your Network
v1.2, January 2007
There are several ways you can enhance the security of your wireless network. In order of
increasing effectiveness:
Turn Off the Broadcast of the Wireless Network Name SSID.
If you disable the broadcast
of the SSID, only devices that know the correct SSID can connect. This nullifies the wireless
network ‘discovery’ feature of some products such as Windows XP, but your data is still fully
exposed to an intruder using available wireless eavesdropping tools.
Restrict Access Based on MAC Address.
You can restrict access to only trusted computers
so that unknown computers cannot wirelessly connect to the WNR834B. MAC address
filtering adds an obstacle against unwanted access to your network by the general public, but
the data broadcast over the wireless link is fully exposed. This data includes your trusted MAC
addresses, which can be read and impersonated by a hacker.
WEP.
Wired Equivalent Privacy (WEP) data encryption provides moderate data security.
WEP Shared Key authentication and WEP data encryption can be defeated by a determined
eavesdropper using publicly available tools.
WPA-PSK
and
WPA2-PSK.
Wi-Fi Protected Access with Pre-Shared Key (WPA-PSK and
WPA2-PSK) data encryption provides extremely strong data security, very effectively
blocking eavesdropping. Because WPA and WPA2 are relatively new standards, older wireless
adapters and devices may not support them. Check whether newer drivers are available from
the manufacturer.
Turn Off the Wireless LAN.
If you disable the wireless LAN, wireless devices cannot
communicate with the router at all. You might choose to turn off the wireless LAN when you
are away or when other users of your network all use wired connections.
Figure 3-1

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top