Netgear PR2000 User Manual Page 42

  • Download
  • Add to my manuals
  • Print
  • Page
    / 145
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 41
genie BASIC Settings
42
Trek N300 Travel Router and Range Extender PR2000
7. (Optional) Change the security settings as needed.
For more information, see Change the Wireless Security Option on page 42.
8. Click the Apply button.
Your settings are saved.
If you were connected wirelessly to the router and you changed the SSID or wireless
security, you are disconnected from the network.
9. If you changed the settings, make sure that you can connect wirelessly to the network with
its new settings.
If you cannot connect wirelessly, check the following:
Is your computer or wireless device connected to another wireless network in your
area? Some wireless devices automatically connect to the first open network (without
wireless security) that they discover.
Is your computer or wireless device trying to connect to your network with its old
settings (before you changed the settings)? If so, update the wireless network
selection in your computer or wireless device to match the current settings for your
network.
Change the Wireless Security Option
A security option is the type of security protocol applied to your wireless network. The
security protocol in force encrypts data transmissions and ensures that only trusted devices
receive authorization to connect to your network. Wi-Fi Protected Access (WPA) has several
options including pre-shared key (PSK) encryption.
Note: The Trek comes with unique preset wireless security. These settings
are on the product label. NETGEAR recommends that you use
preset security so that you can refer to the label if you forget the
WiFi password. However, you can change the security option and
passphrase.
WPA encryption is built into all hardware that has the Wi-Fi-certified seal. This seal means
that the product is authorized by the Wi-Fi Alliance (www.wi-fi.org/) because it complies with
the worldwide single standard for high-speed wireless local area networking.
WPA uses a passphrase for authentication and to generate the initial data encryption keys.
Then it dynamically varies the encryption key. WPA-PSK uses Temporal Key Integrity
Protocol (TKIP) data encryption, implements most of the IEEE 802.11i standard, and works
with all wireless network interface cards, but not all wireless access points.
WPA2-PSK is stronger than WPA-PSK. It is advertised to be theoretically indecipherable due
to the greater degree of randomness in encryption keys that it generates. WPA2-PSK gets
higher speed because it is implemented through hardware; WPA-PSK is implemented
Page view 41
1 2 ... 37 38 39 40 41 42 43 44 45 46 47 ... 144 145

Comments to this Manuals

No comments