Reference Manual for the Mobile Broadband Router MBR814X
4-10
v1.0, January 2006
Restricting wireless access prevents intruders from connecting to your network. However, the
wireless data transmissions are still vulnerable to snooping. Using the WEP data encryption
settings described below will prevent a determined intruder from eavesdropping on your wireless
data communications. Also, if you are using the Internet for such activities as purchases or
banking, those Internet sites use another level of highly secure encryption called SSL. You can tell
if a web site is using SSL because the web address begins with HTTPS rather than HTTP.
Authentication Type Selection
The MBR814X lets you select the following wireless authentication schemes.
•
Automatic
•
Open System
•
Shared key
Set your wireless adapter according to the authentication scheme you choose for the MBR814X
router. Please refer to
the link to
“Wireless Communications:
in Appendix B
for a full explanation of each
of these options, as defined by the IEEE 802.11g wireless communication standard.
Encryption Choices
Please refer to
the link to
“Wireless Communications:
in Appendix B
for a full explanation of each of the
following choices, as defined by the IEEE 802.11g wireless communication standard. Choose the
encryption strength from the drop-down list:
•
Disable
No encryption will be applied. This setting is useful for troubleshooting your wireless
connection, but leaves your wireless data fully exposed.
•
64 or 128 bit WEP
When 64 Bit WEP or 128 Bit WEP is selected, WEP encryption will be applied.
If WEP is enabled, you can manually or automatically program the four data encryption keys.
These values must be identical on all computers and access points in your network.
There are two methods for creating WEP encryption keys:
•
Passphrase. Enter a word or group of printable characters in the Passphrase box and click the
Generate button.
Note:
The authentication scheme is separate from the data encryption. You can choose an
authentication scheme which requires a shared key but still leave the data
transmissions unencrypted. If you require strong security, use both the Shared Key
and WEP encryption settings.
Summary of Contents for MBR814X
Page 4: ...v1 0 January 2006 iv...
Page 12: ...Reference Manual for the Mobile Broadband Router MBR814X 1 4 v1 0 January 2006...
Page 20: ...Reference Manual for the Mobile Broadband Router MBR814X 2 8 v1 0 January 2006...
Page 30: ...Reference Manual for the Mobile Broadband Router MBR814X 3 10 v1 0 January 2006...
Page 58: ...Reference Manual for the Mobile Broadband Router MBR814X 5 16 v1 0 January 2006...
Page 75: ...Reference Manual for the Mobile Broadband Router MBR814X 6 17 v1 0 January 2006...
Page 76: ...Reference Manual for the Mobile Broadband Router MBR814X 6 18 v1 0 January 2006...
Page 88: ...Reference Manual for the Mobile Broadband Router MBR814X 7 12 v2 0 BETA January 2006...
Page 100: ...Reference Manual for the Mobile Broadband Router MBR814X Appendix B 2 v1 0 January 2006...