Netgear PR2000 - Trek N300 Travel Router and Range Extender 사용자 설명서

다운로드
페이지 149
genie BASIC Settings 
46
Trek N300 Travel Router and Range Extender PR2000 
Enable Wireless Isolation. If this check box is selected, wireless clients (computers 
or wireless devices) that join the network can use the Internet, but cannot access 
each other or access Ethernet devices on the network.
7. 
(Optional) Change the security settings as needed.
8. 
Click the Apply button.
Your settings are saved.
If you were connected wirelessly to the router and you changed the SSID or wireless 
security, you are disconnected from the network.
9. 
If you changed the settings, make sure that you can connect wirelessly to the network with 
its new settings. 
If you cannot connect wirelessly, check the following:
Is your computer or wireless device connected to another wireless network in your 
area? Some wireless devices automatically connect to the first open network (without 
wireless security) that they discover.
Is your computer or wireless device trying to connect to your network with its old 
settings (before you changed the settings)? If so, update the wireless network 
selection in your computer or wireless device to match the current settings for your 
network.
Change the Wireless Security Option
A security option is the type of security protocol applied to your wireless network. The 
security protocol in force encrypts data transmissions and ensures that only trusted devices 
receive authorization to connect to your network. Wi-Fi Protected Access (WPA) has several 
options including pre-shared key (PSK) encryption. 
Note:
The Trek comes with unique preset wireless security. These settings 
are on the product label. NETGEAR recommends that you use 
preset security so that you can refer to the label if you forget the 
WiFi password. However, you can 
change the security option and 
passphrase. 
WPA encryption is built into all hardware that has the Wi-Fi-certified seal. This seal means 
that the product is authorized by the Wi-Fi Alliance (
www.wi-fi.org/
) because it complies with 
the worldwide single standard for high-speed wireless local area networking. 
WPA uses a passphrase for authentication and to generate the initial data encryption keys. 
Then it dynamically varies the encryption key. WPA-PSK uses Temporal Key Integrity 
Protocol (TKIP) data encryption, implements most of the IEEE 802.11i standard, and works 
with all wireless network interface cards, but not all wireless access points.