Chapter 3: Networking and Advanced Settings
32
Chapter 3
type a word or sentence and click on “generate WEP keys.” The gateway will automatically
generate a key randomly. You have to write it down and use the same on the wireless equipped
PC to allow proper descrambling.
Fig. 33
Fig. 34
Advanced Web Page (Fig. 33)
This page enables some advanced 802.11b settings to be made.
The factory default values should provide good results in most
cases. We don’t recommend you change these settings unless
you have technical knowledge of 802.11 wireless technology.
Access Control Page (Fig. 34)
The Access Control feature enables you to restrict wireless access
to specific computers. Use this feature to prevent outsider
wireless PCs from connecting to your private network. The
Access Control Web Page allows you to reinforce the security of
the wireless connnection by:
•
Hiding the network Name to other PCs with the “Close
Network” functionality activated (no SSID Broadcast
(Network Name).
•
Open System, Shared Key, Open System or Shared Key
802.11 networks use two authentication methods: open-
system authentication and shared-key authentication. In
both schemes, each mobile client (called a station) must
authenticate to the access point.
•
Open-system authentication might better be called “no
authentication”, because no actual authentication takes
place: the station says “please authenticate me”, and the
Access Point does so, with no credential exchange.
•
Shared-key authentication is somewhat more robust (except
that it depends on WEP). The station requests
16096620 DCW615/25. 03 Network
6/26/03, 10:45 AM
32