Netgear 10300137 ユーザーズマニュアル

ページ / 85
  Chapter 2:  Wireless Network Configuration
 
   
|
     
21
Mobile Broadband 11n Wireless Router MBR1000 
4. 
Select the Authentication TypeAutomaticOpen System, or Shared Key. The default is 
Open System.
Note:  
The authentication is separate from the data encryption. You can 
select authentication that requires a shared key, but still leaves data 
transmissions unencrypted. Security is stronger if you use both the 
Shared Key and WEP encryption settings.
5. 
Select the Encryption Strength setting:
•     
WEP (Wired Equivalent Privacy) 64-bit encryption. Enter 10 hexadecimal digits 
(any combination of 0–9, a–f, or A–F).
•     
WEP (Wired Equivalent Privacy) 128-bit encryption. Enter 26 hexadecimal digits 
(any combination of 0–9, a–f, or A–F).
6. 
Enter the encryption keys. You can manually or automatically program the four data 
encryption keys. These values must be identical on all computers and Access Points in your 
network:
•     
Passphrase. To use a passphrase to generate the keys, enter a passphrase, and 
click Generate. This automatically creates the keys. Wireless stations must use the 
passphrase or keys to access the router. 
Note:  
Not all wireless adapters support passphrase key generation.
•     
Key 1-Key4. These values are not case-sensitive. You can manually enter the four 
data encryption keys. These values must be identical on all computers and access 
points in your network. Enter 10 hexadecimal digits (any combination of 0
9, a
f, or 
A
F).
7. 
Select which of the four keys will be the default. 
Data transmissions are always encrypted using the default key. The other keys can be 
used only to decrypt received data. The four entries are disabled if WPA-PSK or WPA 
authentication is selected. 
8. 
Click Apply to save your settings.
Configuring WPA, WPA2, or WPA + WPA2
Both WPA and WPA2 provide strong data security. WPA with TKIP is a software 
implementation that can be used on Windows systems with Service Pack 2 or later; WPA2 
with AES is a hardware implementation; see your device documentation before implementing 
it. Consult the product documentation for your wireless adapter for instructions for configuring 
WPA settings.