Choosing Authentication And Security Encryption Methods; Authentication Scheme Selection; Encryption Strength Choices - NETGEAR MR814v2 Reference Manual

Cable/dsl wireless router
Hide thumbs Also See for MR814v2:
Table of Contents

Advertisement

Reference Manual for the MR814v2 Cable/DSL Wireless Router

Choosing Authentication and Security Encryption Methods

Figure 3-7: Encryption Strength
Restricting wireless access to your network prevents intruders from connecting to your network.
However, the wireless data transmissions are still vulnerable to snooping. Using the WEB data
encryption settings described below will prevent a determined intruder from eavesdropping on
your wireless data communications. Also, if you are using the Internet for such activities as
purchases or banking, those Internet sites use another level of highly secure encryption called SSL.
You can tell if a web site is using SSL because the web address begins with HTTPS rather than
HTTP.

Authentication Scheme Selection

The MR814v2 lets you select the following wireless authentication schemes.
Automatic.
Open System.
Shared key.
The authentication scheme is separate from the data encryption. You can
Note:
choose an authentication scheme which requires a shared key but still leave the
data transmissions unencrypted. If you require strong security, use both the
Shared Key and WEP encryption settings
Set your wireless adapter according to the authentication scheme you choose for the MR814v2
router. Please refer to
these options, as defined by the IEEE 802.11b wireless communication standard.

Encryption Strength Choices

Choose the encryption strength from the drop-down list. Please refer to
Parameters" on page D-5
802.11b wireless communication standard.
3-6
"Authentication and WEP" on page D-3
for a full explanation of each of these options, as defined by the IEEE
.
for a full explanation of each of
"Overview of WEP
Wireless Configuration

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mr814 - 802.11b cable/dsl wireless router

Table of Contents