Page 21 / 92 Scroll up to view Page 16 - 20
Wireless Configuration
3-1
v1.3, May 2006
Chapter 3
Wireless Configuration
This chapter describes how to configure the wireless features of your WNR834M router. In
planning your wireless network, you should consider the level of security required. You should
also select the physical placement of your firewall in order to maximize the network speed. For
further information on wireless networking, see
“Wireless Communications” in Appendix B
.
Observing Performance, Placement, and Range Guidelines
The operating distance or range of your wireless connection can vary significantly based on the
physical placement of the wireless firewall. The latency, data throughput performance, and
notebook power consumption of wireless adapters also vary depending on your configuration
choices.
For best results, place your firewall:
Near the center of the area in which your computers will operate.
In an elevated location such as a high shelf where the wirelessly connected computers have
line-of-sight access (even if through walls).
Away from sources of interference, such as computers, microwaves, and 2.4 GHz cordless
phones.
Away from large metal surfaces.
The time it takes to establish a wireless connection can vary depending on both your security
settings and placement. WEP connections can take slightly longer to establish. Also, WEP, WPA-
PSK and WPA2-PSK encryption can consume more battery power on a notebook computer.
Note:
Failure to follow these guidelines can result in significant performance degradation
or inability to wirelessly connect to the router. For complete range and
performance specifications, please see
“General Specifications” on page A-3
.
Page 22 / 92
NETGEAR RangeMax™ NEXT Wireless Router WNR834M Reference Manual
3-2
Wireless Configuration
v1.3, May 2006
Implementing Appropriate Wireless Security
Unlike wired network data, your wireless data transmissions can be received well beyond your
walls by anyone with a compatible adapter. For this reason, use the security features of your
wireless equipment. The WNR834M router provides highly effective security features which are
covered in detail in this chapter. Deploy the security features appropriate to your needs.
There are several ways you can enhance the security of your wireless network.
Restrict Access Based on MAC address.
You can restrict access to only trusted computers so
that unknown computers cannot wirelessly connect to the WNR834M. MAC address filtering
adds an obstacle against unwanted access to your network, but the data broadcast over the
wireless link is fully exposed.
Turn Off the Broadcast of the Wireless Network Name SSID.
If you disable broadcast of
the SSID, only devices that have the correct SSID can connect. This nullifies the wireless
network ‘discovery’ feature of some products such as Windows XP, but the data is still fully
exposed to a determined snoop using specialized test equipment like wireless sniffers.
WEP.
Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared
Key authentication and WEP data encryption block all but the most determined eavesdropper.
Note:
Indoors, computers can connect over 802.11b/g wireless networks at ranges of up
to 300 feet. Such distances can allow for others outside of your immediate area to
access your network.
Figure 3-1
Page 23 / 92
NETGEAR RangeMax™ NEXT Wireless Router WNR834M Reference Manual
Wireless Configuration
3-3
v1.3, May 2006
WPA-PSK
and
WPA2-PSK.
Wi-Fi Protected Access, Pre-Shared Key (WPA-PSK and
WPA2-PSK) data encryption provide strong data security. WPA-PSK and WPA2-PSK block
eavesdropping. Because these are new standards, wireless device driver and software
availability may be limited.
Turn Off the Wireless LAN.
If you disable the wireless LAN, wireless devices cannot
communicate with the router at all. You might choose to turn off the wireless LAN when you
are away and other users of your network all use wired connections.
Information to Gather Before Changing Basic Wireless Settings
Before customizing your wireless settings, print this form and record the following information. If
you are working with an existing wireless network, the person who set up or is responsible for the
network will be able to provide this information. Otherwise, you must choose the settings for your
wireless network. Either way, record the settings for your wireless network in the spaces below.
Wireless Network Name (SSID)
:
______________________________
The SSID identifies
the wireless network. You can use up to 32 alphanumeric characters. The SSID
is
case
sensitive. The SSID in the wireless adapter card must match the SSID of the wireless router. In
some configuration utilities (such as in Windows XP), the term “wireless network name” is
used instead of SSID.
If WEP Authentication is Used,
circle one:
Open System
,
Shared Key, or Auto
.
WEP Encryption key size
. Choose one:
64-bit
or
128-bit
. Again, the encryption key size
must be the same for the wireless adapters and the wireless router.
Data Encryption (WEP) Keys
. There are two methods for creating WEP data encryption
keys. Whichever method you use, record the key values in the spaces below.
Passphrase method
. ______________________________
These characters
are
case
sensitive. Enter a word or group of printable characters and click the
Generate Keys
button. Not all wireless devices support the passphrase method.
Manual method
. These values
are not
case sensitive. For 64-bit WEP, enter 10 hex
digits (any combination of 0-9 or a-f). For 128-bit WEP, enter 26 hex digits.
Key 1: ___________________________________
Key 2: ___________________________________
Note:
If you select
Shared Key
, the other devices in the network will not connect
unless they are also set to Shared Key and are configured with the correct key.
Page 24 / 92
NETGEAR RangeMax™ NEXT Wireless Router WNR834M Reference Manual
3-4
Wireless Configuration
v1.3, May 2006
Key 3: ___________________________________
Key 4: ___________________________________
If WPA-PSK or WPA2-PSK Authentication is Used:
Passphrase
: ______________________________
These characters
are
case sensitive.
Enter a word or group of printable characters. When you use WPA-PSK, the other devices
in the network will not connect unless they are set to WPA-PSK as well and are configured
with the correct Passphrase. Similarly, when you use WPA2-PSK, the other devices in the
network will not connect unless they are also set to WPA2-PSK and are configured with
the correct Passphrase.
Use the procedures described in the following sections to configure the WNR834M. Store this
information in a safe place.
Default Factory Settings
When you first receive your WNR834M, the default factory settings are in effect, as shown below.
You can restore these defaults with the Factory Default Restore button on the rear panel. After you
install the WNR834M router, use the procedures below to customize any of the settings to better
meet your networking needs.
FEATURE
DEFAULT FACTORY SETTINGS
Wireless Router Radio
Enabled
Wireless Access List (MAC Filtering)
All wireless stations allowed
SSID broadcast
Enabled
SSID
NETGEAR
802.11b/g RF Channel
Auto
Mode
Up to 300 Mbps
Security
None
Page 25 / 92
NETGEAR RangeMax™ NEXT Wireless Router WNR834M Reference Manual
Wireless Configuration
3-5
v1.3, May 2006
Understanding Wireless Settings
To configure the Wireless settings of your firewall, click the
Wireless
link in the main menu of the
browser interface. The Wireless Settings menu appears, as shown below.
Name (SSID).
The SSID is also known as the wireless network name. Enter a value of up to
32 alphanumeric characters. In a setting where there is more than one wireless network,
different wireless network names provide a means for separating the traffic. Any device you
want to participate in a particular wireless network will need to use this SSID for that network.
The WNR834M default SSID is:
NETGEAR
.
Region.
This field identifies the region where the WNR834M can be used. It may not be legal
to operate the wireless features of the wireless router in a region other than one of those
identified in this field.
Channel.
This field determines which operating frequency is used. It should not be necessary
to change the wireless channel unless you notice interference problems with another nearby
access point. For more information on the wireless channel frequencies, see
“Wireless
Communications” in Appendix B
.
Figure 3-2
Note:
The region selection feature may not be available in all countries.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top