Hercules Wireless N Router
HWNR-300
38/101 – User Manual
Don't forget to protect your network by
selecting a security key; otherwise, any user,
whether with bad intentions or not, will be able
to connect to it.
For details on how to protect your network,
please refer to section
3.6.2. Securing your
WiFi network
.
- Click the
Modify
button to validate your
settings.
The access point restarts. All computers or
devices connected via WiFi are disconnected.
The ADSL connection, however, remains
active.
3.6.2.Securing your WiFi network
Creating a WiFi network is very useful if you have several wireless computers or devices, but how can you
avoid having someone on the outside connect to your network without permission or intercept your
unencrypted data exchanges? Thanks to the WiFi Manager N, you can define your own security choices. To
help you select the best level of security for your network, we invite you to consult the table below, which sums
up the
5 types of security
supported by WiFi Manager N.
Type
Level of security
Key used
Authentication
WEAK (
WEP
64
)
The lowest level of security, whereby
simple encryption is carried out on
exchanged data. Each wireless client
in the network must use the same key
to decode the transmission.
64-bit
key in hexadecimal
format (10 characters), or in
alphanumeric format with 5
ASCII characters (e.g.:
hello
).
A
hexadecimal key
is
composed of numbers 0 to 9
and letters A to F (example:
A123BCD45E for a 64-bit
key).
An
alphanumeric character
corresponds either to a
number (0-9), or to a letter
(a-z or A-Z).
Open (no authentication),
Shared (authentication
method via shared key) or
Auto (authentication when
requested by the device).
MEDIUM
(
WEP 128
)
Level of security identical to that of
WEP 64. Only the key length is
different.
128-bit
key in hexadecimal
format (26 characters), or in
alphanumeric format with 13
ASCII characters.
A
hexadecimal key
is
composed of numbers 0 to 9
and letters A to F.
An
alphanumeric character
corresponds either to a
number (0-9), or to a letter
(a-z or A-Z).
Open (no authentication),
Shared (authentication
method via shared key) or
Auto (authentication when
requested by the device).