Reference Manual for the RangeMax 240 Wireless Router WPNT834
Wireless Configuration
4-7
v1.0, November 2005
•
Wireless Network Name (SSID)
:
______________________________
The SSID identifies
the wireless network. You can use up to 32 alphanumeric characters. The SSID
is
case
sensitive. The SSID in the wireless adapter card must match the SSID of the wireless router. In
some configuration utilities (such as in Windows XP), the term “wireless network name” is
used instead of SSID.
•
If WEP Authentication is Used,
circle one:
Open System
,
Shared Key, or Auto
.
–
WEP Encryption key size
. Choose one:
64-bit
or
128-bit
. Again, the encryption key size
must be the same for the wireless adapters and the wireless router.
–
Data Encryption (WEP) Keys
. There are two methods for creating WEP data encryption
keys. Whichever method you use, record the key values in the spaces below.
•
Passphrase method
. ______________________________
These characters
are
case
sensitive. Enter a word or group of printable characters and click the
Generate Keys
button. Not all wireless devices support the passphrase method.
•
Manual method
. These values
are not
case sensitive. For 64-bit WEP, enter 10 hex
digits (any combination of 0-9 or a-f). For 128-bit WEP, enter 26 hex digits.
Key 1: ___________________________________
Key 2: ___________________________________
Key 3: ___________________________________
Key 4: ___________________________________
•
If WPA-PSK or WPA2-PSK Authentication is Used:
–
Passphrase
: ______________________________
These characters
are
case sensitive.
Enter a word or group of printable characters. When you use WPA-PSK, the other devices
in the network will not connect unless they are set to WPA-PSK as well and are configured
with the correct Passphrase. Similarly, when you use WPA2-PSK, the other devices in the
network will not connect unless they are aslo set to WPA2-PSK and are configured with
the correct Passphrase.
Use the procedures described in the following sections to configure the WPNT834. Store this
information in a safe place.
Note:
If you select
Shared Key
, the other devices in the network will not connect
unless they are also set to Shared Key and are configured with the correct key.