31
If you are entering a network key of your choice, enter 13 ASCII characters or 26
hexadecimal digits for 128-bit encryption keys. Enter 5 ASCII characters or 10
hexadecimal digits for 64-bit encryption keys.
Otherwise, type something into the text box and click on
Generate WEP Keys
and
WEP Keys will automatically be generated for you.
Caution!
Do not click
Apply
until you have entered WEP Keys.
9
Click
Apply
.
10
Now you need to set up each of your wireless devices with the SSID and
passphrase. See
Chapter 3, Connecting other Devices to the Cable Modem/Router
for help on connecting your wireless computers and devices.
Your security setup configuration is now complete!
Disabling Security
If for some reason you need to set up an unsecured network, you will need to disable the
default security that is currently set up for your Cable Modem/Router. Follow the
instructions below.
1
Open the Zoom Configuration Manager by typing the following in your Web browser's
address bar:
http://192.168.0.1
2
In the
Login
dialog box, type the following User Name and Password in lower case,
then click
Login
.
User Name:
admin
Password:
admin
3
Click
Wireless
on the top menu.
4
Then click
Primary Network
on the left-side menu and in the text box labeled
Network Name (SSID)
, type an SSID of your choice. The SSID needs to be at least
one character long, and it’s probably best to pick a name that you’ll recognize as
yours.
5
Set all the following drop-down menus to Disable: WPA, WPA-PSK, WPA2, and
WPA2-PSK.
6
Click
Apply
.
7
Now you need to set up each of your wireless devices with the correct SSID. See
Chapter 3, Connecting other Devices to the Cable Modem/Router
for help on
connecting your wireless computers and devices. Since Security is disabled you do
not need to configure security as described in Chapter 3.
That’s it! You have now disabled security.
Summary of Contents for 5354
Page 1: ...Cable Modem Router with Wireless N U S E R M A N U A L ...
Page 5: ...5 APPENDIX B IF YOU NEED HELP 141 APPENDIX C COMPLIANCE 142 ...
Page 54: ...54 Table 4 describes the items you can select Figure 7 Example of Diagnostics Ping Page ...
Page 66: ...66 Figure 15 shows an example of the menu Figure 15 Example of Backup Page ...
Page 68: ...68 Figure 16 Example of Options Page ...
Page 90: ...90 Figure 26 Example of Basic Page ...
Page 103: ...103 Figure 32 Example of Guest Network Page ...
Page 110: ...110 Figure 35 Example of WMM Page ...
Page 118: ...118 Figure 39 Example of IPSec Page ...