User's Manual
Table Of Contents
- Reference Manual for the 54 Mbps Wall-Plugged Router WGX102
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Connecting the Router to the Internet
- Prepare to Install Your Wireless Router
- First, Connect a Wall-Plugged Ethernet Bridge XE102
- Connect the Wireless Router to the Internet
- Now, Set Up a Computer for Wireless Connectivity
- Troubleshooting Tips
- Overview of How to Access the Wireless Router
- How to Manually Configure Your Internet Connection
- Using the Smart Setup Wizard
- NETGEAR Product Registration, Support, and Documentation
- Chapter 4 Wireless Configuration
- Chapter 5 Content Filtering
- Chapter 6 Maintenance
- Chapter 7 Advanced Configuration of the Router
- Chapter 8 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network, Routing, Firewall, and Basics
- Appendix C Preparing Your Network
- What You Need To Use a Router with a Broadband Modem
- Preparing Your Computers for TCP/IP Networking
- Configuring Windows 95, 98, and Me for TCP/IP Networking
- Configuring Windows NT4, 2000 or XP for IP Networking
- Configuring the Macintosh for TCP/IP Networking
- Verifying the Readiness of Your Internet Account
- Restarting the Network
- Appendix D Wireless Networking Basics
- Glossary
- Index
Reference Manual for the 54 Mbps Wall-Plugged Router WGX102
Introduction 2-9
July 2004 202-10036-01
Protect my
wireless
connection
from snooping,
hacking, or
information
theft.
1. Assure that the
wireless network
has security
features enabled.
2. Configure my
WGX102 with the
security settings of
the wireless
network.
3. Use Windows
security features.
• A wireless network WEP or
WPA security enabled.
• Wireless networking
equipment that supports
WEP or WPA, such as the
WGX102.
To learn about wireless
networking security, see
“Wireless Networking Basics” on
page D-1.
To use WEP security features,
see “Implement Appropriate
Wireless Security” on page 4-2”
and configure your WGX102
accordingly.
Note: Secure Internet sites such as banks and online merchants use encryption security built into browsers
like Internet Explorer and Netscape. Any wireless networking security features you might implement are in
addition to those already in place on secure Internet sites.
Table 2-1. A Road Map for How to Get There From Here
If I Want To? What Do I Do? What’s Needed? How Do I?