1. Home
  2. /
  3. Manuals
  4. /
  5. Zoom
  6. /
  7. 4501
  8. /
  9. 5
Page 21 / 62 Scroll up to view Page 16 - 20
TIP
: Other wireless networks might be within range of your network. Your neighbors,
for instance, may be within range. If possible, there should be at least a five-channel
difference between your network and neighboring networks with strong signals.
Having less than a five-channel difference may result in interference with your
connection.
Wireless Security Settings
If you accepted the default to
Enable
the
Wireless Module
(on the
Wireless Settings
page
at Step 4), the following page opens when you click
Next
.
Configuring Authentication and Encryption
By default,
Authentication
and
Encryption
services are not configured. You can
configure both
settings on the
Wireless settings
page.
1
To configure
Authentication
, select either
W
ired
E
quivalent
P
rivacy (
WEP)
or
W
iFi
P
rotected
A
ccess-
P
re-
S
hared
K
ey (
WPA-PSK/WPA2-PSK
) from the
dropdown menu.
Important
: Be aware that
WEP
is a basic authentication service and is not as
secure as
WPA-PSK/WPA2-PSK
. If you have devices on your wireless network
that support only
WEP
(for example, some gaming consoles), you will need to
select
WEP
as your
Authentication
method.
Chapter 3: Using the Configuration Manager's Setup Wizard
21
Downloaded from
www.Manualslib.com
manuals search engine
Page 22 / 62
WPA-PSK/WPA2-PSK Authentication
We recommend this setting if all devices on your network support either WPA or
WPA2. Your router will automatically detect whether is should use WPA or WPA2.
When you select
WPA-PSK/WPA2-PSK
from the
Authentication
dropdown menu, the
Encryption
field expands, as shown in the following figure
.
Field
Entry
Authentication
Accept
WPA-PSK/WPA2 PSK
as the default value.
Encryption
Accept the default,
TKIP/AES
, which supports dynamic encryption
keys using
TKIP
or
AES
algorithms. Select
AES
if you chose
WPA-PSK/
WPA2-PSK
for the authentication method. Select
TKIP
if you chose
WPA-PSK
/
WPA2-PSK
for the authentication methods. Usually WPA
uses TKIP and WPA2 uses AES.
Preshare Key
In the
Preshare Key
field, enter a value for the key. The maximum
value is 32 characters. The minimum value is 8 characters.
Write your key in the space below for future reference, and then
enter it in the
Preshare Key
field:
— —
— —
WEP Authentication and Encryption
If you have devices on your wireless network that support only
WEP
(for example,
some gaming consoles), you will need to select
WEP
as your
Authentication
method.
When you select
WEP
from the
Authentication
dropdown menu, the
Encryption
field
expands, as shown in the following figure
.
22
3G Wireless-N Router User Guide
Downloaded from
www.Manualslib.com
manuals search engine
Page 23 / 62
Field
Entry
Authentication
Select
WEP
Encryption
Select
WEP
If all the wireless devices in the network are Zoom products, select
Hex
. Otherwise, select
ASCII
. Although Zoom products support both
Hex
and
ASCII
, we recommend using
Hex
.
Encryption
WEP Key 1, 2, 3, 4
If you selected Hex
format
and you chose a 128-bit key length, 26
hexadecimal values are required. Write the 26-hexadecimal key in the
space below for future reference, and then enter it in the Key 1 box.
— — — — — — — — — — — — —
— — — — — — — — — — — — —
If you selected Hex
format
and you chose a 64-bit key length, 13
hexadecimal values are required. Write the 13-hexadecimal key in the
space below for future reference, and then enter it in the Key 1 box.
— — — — — — — — — — — — —
If you selected ASCII format
, and you chose a 128-bit key length, 13
ASCII characters are required. Write the 13-ASCII-character key in the
space below for future reference, and then enter it in the Key 1 box.
— — — — — — — — — — — — —
If you selected ASCII format, and you chose a 64-bit key length, 5
ASCII characters are required. Write the 5-ASCII-character key in the
space below for future reference, and then enter it in the Key 1 box.
— — — — —
Step 5. Summary
The
Summary
page displays the updated configuration settings for your router and lets
you accept, change, and test the configured values.
Chapter 3: Using the Configuration Manager's Setup Wizard
23
Downloaded from
www.Manualslib.com
manuals search engine
Page 24 / 62
1
To edit your entries, click
Back
as many times as needed to access the page
for the field(s) to be edited, then click
Next
to continue with your edits or to
return to the updated
Summary
page.
2
To test the updated configuration on your network, click the checkbox next to
Do you want to proceed with the network testing
?
3
To use the Ethernet port as the LAN port, click the checkbox next to
The
Ethernet Port will be used as LAN Port after saving. Confirm?
This option is only
available if you are using your 3G modem as your
Wan type
.
4
When you're satisfied with the configured settings, click
Apply Settings
to save
the new configuration.
Step 6. Finish
The
Finish
page displays the saved configuration settings for your router.
1
Click
Finish
to exit the
Setup Wizard
.
24
3G Wireless-N Router User Guide
Downloaded from
www.Manualslib.com
manuals search engine
Page 25 / 62
4
Wireless and Wireless Security Setup
Your 3G Wireless-N Router's default (factory) settings provide no wireless network
security. If you don't want unauthorized wireless access to your network, we
recommend that you enable wireless network security. To do this, you'll need to
configure the router and each device on your network for the level of security that you
want.
Before setting up wireless security you must decide which method to use.
Use
W
i-Fi
P
rotected
S
etup (
WPS
) when all of your devices support WPS
security. WPS is easy to configure. Please refer to
WPS Configuration
below
for details.
Use
W
ireless
D
istribution
S
ystem (
WDS
) if you want wireless point-to-point
and point-to-multipoint bridging for deployment of a large area. With
WDS
,
you can easily extend the range of your wireless network. Please refer to
WDS Configuration
on page 30 for details.
If you want security without using
WPS
or
WDS
, you should probably use
the
Setup Wizard
as described in Chapter 3.
A manual setup option is also available. Please refer to
Configuring Wireless
Security Manually
on page 27.
WPS Configuration
You can automatically configure WPS security using the router's built-in WPS
configuration program on each client device that is part of your wireless network.
Configuration Methods
WPS offers three configuration methods. Choose the method that is compatible with
the hardware and software options available on your router and client device.
Note
: WPS configures one client device at a time. Please repeat the configuration
method for each client on your wireless network that supports WPS security.
Method One
Use this method if your router and client devices have a
WPS
button. This button can
be either a physical button on the unit or a software button in its application.
1
Press the
WPS
button on your 3G router and hold it in for seven (7) seconds until the
Wireless LED starts blinking rapidly.
Chapter 4: Wireless and Wireless Security Setup
25
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top