Belkin Router F5D7234-4user Manual
Here you can view all the pages of manual Belkin Router F5D7234-4user Manual. The Belkin manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 51
49Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce s ecuring your Wi- fi ® n etwork Here are a few different ways you can maximize the security of your wireless network and protect your data from prying eyes and ears. This section is intended for the home, home office, and small office user. At the time of this User Manual’s publication, there are four encryption methods available. Name 64-Bit Wired Equivalent Privacy 128-Bit Wired...
Page 52
50Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce encr yption Keys After selecting either the 64-bit or 128-bit WEP encryption mode, it is critical that you generate an encryption key. If the encryption key is not consistent throughout the entire wireless network, your wireless networking devices will be unable to communicate with one another on your network and you will not be able to successfully communicate within your network....
Page 53
51Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce sharing the s ame network Keys Most Wi-Fi products ship with security turned off. So once you have your network working, you need to activate WEP or WPA and make sure your wireless networking devices are sharing the same network key. The following diagram shows the effect of not having the correct network key throughout your network. Using a Hexadecimal Key A hexadecimal key is a...
Page 54
52Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce W eP setup 64- bit W eP encryption 1� Select “WEP” from the “Security” menu’s “Allowed Client Type”. 2 � Select “64 bit” from the drop-down menu in “WEP Mode”. 3 � After selecting your WEP encryption mode, you can enter your key by typing in the hex key manually, or you can type in your passphrase. Click “Generate” to generate four different hex keys. A hex (hexadecimal) key is a...
Page 55
53Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce 128- bit W eP encr yption n ote to Mac users: The passphrase option will not operate with Apple AirPort. To configure encryption for your Mac computer, set the encryption using the manual method described in the next section. W aRn InG: If you are configuring the G Wireless Router or access point from a computer with a wireless client, you will need to reconnect to the Router and...
Page 56
54Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce Changing the Wireless s ecurity settings Your Router is equipped with the latest security standard called Wi-Fi Protected Access 2 (WPA2) and the legacy security standard called Wired Equivalent Privacy (WEP). Your Router also supports the Wi-Fi Protected Setup (WPS) specification, which simplifies the setup of a wireless network. WPS uses familiar methodologies, such as typing in a...
Page 57
55Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce 1� Wi-Fi Protected Setup (WPS): Enabled or Disabled. 2 � Personal Identification Number (PIN) Method: In this method, a wireless client wishing to access your network must supply an 8-digit PIN to the Router. After clicking “Enroll”, you must start the WPS handshaking procedure from the client within two minutes. 3 � Router PIN: If an external registrar is available, you may enter...
Page 58
56Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce setting WP a/WP a2 Guest access ( optional) The guest pre-shared key allows guest users Internet-only access to restrict them from entering your network and having access to files on your PCs. Enter your pre-shared key for guest access. This can be from eight to 63 characters and can be letters, numbers, or symbols. Click “Apply Changes” to finish. 1� Select “WPA / WPA2” from the...
Page 59
57Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce setting up WP a for Wireless desktop and Wireless notebook Cards that are no T Manufactured by belkin If you do NOT have a Belkin WPA Wireless Desktop or Wireless Notebook Card and it is not equipped with WPA-enabled software, a file from Microsoft called “Windows XP Support Patch for Wireless Protected Access” is available for free download. Please note: The file that...
Page 60
58Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce 4� Under the “Wireless Networks” tab, click the “Configure” button and you will see the following screen. 5� For a home or small business user, select “WPA-PSK” under “Network Authentication”. note: Select “WPA” if you are using this computer to connect to a corporate network that supports an authentication server such as a radius server. Please consult your network...