User Manual
Table Of Contents
- RangeMax NEXT Wireless Router WNR834A Reference Manual
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Connecting the Router to the Internet
- Prepare to Install Your Wireless Router
- First, Use the Smart Wizard to Configure the Wireless Router
- Now, Set Up a Computer for Wireless Connectivity
- Troubleshooting Tips
- How to Manually Configure Your Internet Connection
- Using the Smart Setup Wizard
- NETGEAR Product Registration, Support, and Documentation
- Chapter 4 Wireless Configuration
- Chapter 5 Content Filtering
- Chapter 6 Maintenance
- Chapter 7 Advanced Configuration of the Router
- Configuring Advanced Wireless Settings
- Configuring Port Triggering and Port Forwarding
- Configuring Port Forwarding to Local Servers
- Configuring the WAN Setup Options
- Using the LAN IP Setup Options
- Using a Dynamic DNS Service
- Configuring Static Routes
- Enabling Remote Management Access
- Using Universal Plug and Play (UPnP)
- Chapter 8 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Related Documents
RangeMax NEXT Wireless Router WNR834A Reference Manual
Wireless Configuration 4-5
v1.0, April 2006
Table 4-1. Basic Wireless Security Options
Field Description
None
No wireless security.
WEP WEP offers the following options:
• Open System
With Open Network Authentication and 64- or 128-bit WEP Data Encryption, the WNR834A
does perform 64- or 128-bit data encryption but does not perform any authentication.
• Shared Key
Shared Key authentication encrypts the SSID and data.
Choose the Encryption Strength (64- or 128-bit data encryption). Manually enter the key
values or enter a word or group of printable characters in the Passphrase box. Manually
entered keys are case sensitive but passphrase characters are not case sensitive.
Note: Not all wireless adapter configuration utilities support passphrase key generation.
•Auto
The wireless router automatically detects whether Open System or Shared Key is used.
WPA-PSK
WPA2-PSK
WPA-Pre-shared Key does perform authentication. WPA-PSK uses TKIP (Temporal Key
Integrity Protocol) data encryption and WPA2-PSK uses AES (Advanced Encryption Standard)
data encryption. Both dynamically change the encryption keys making them nearly impossible
to circumvent.
Enter a word or group of printable characters in the Password Phrase box. These characters
are case sensitive.
Note: Not all wireless adapter configuration utilities support WPA-PSK and WPA2-PSK.
Furthermore, client software is required on the client. Windows XP Service Pack 2 and
Windows XP Service Pack 1 with WPA patch do include the client software that supports WPA.
Nevertheless, the wireless adapter hardware and driver must also support WPA.