User's Manual
Table Of Contents
- DG834N RangeMaxTM NEXT Wireless ADSL2+ Modem Router Reference Manual
- Contents
- About This Manual
- Chapter 1 Introduction
- Chapter 2 Wireless Configuration
- Chapter 3 Protecting Your Network
- Chapter 4 Managing Your Network
- Chapter 5 Advanced Configuration
- Chapter 6 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Related Documents
DG834N RangeMax
TM
NEXT Wireless ADSL2+ Modem Router Reference Manual
2-6 Wireless Configuration
v1.0, May 2005
Wireless Access Point.
• Enable Wireless Access Point. This field lets you turn off or turn on the wireless access point
built in to the wireless modem router. The wireless icon on the front of the wireless modem
router will also display the current status of the Wireless Access Point to let you know if it is
disabled or enabled. The wireless access point must be enabled to allow wireless stations to
access the Internet.
• Allow Broadcast of Name (SSID). If enabled, the SSID is broadcast to all Wireless Stations.
Stations which have no SSID (or a "null" value) can then adopt the correct SSID for
connections to this Access Point.
• Wireless Isolation. If enabled, Wireless Stations will not be able to communicate with each
other or with Stations on the wired network. This feature should normally be disabled.
Wireless Station Access List.
• By default, any wireless computer that is configured with the correct wireless network name or
SSID will be allowed access to your wireless network. For increased security, you can restrict
access to the wireless network to only specific computers based on their MAC addresses.
Click Setup Access List to display the Wireless Station Access List menu.
Security Options
Table 2-1. Wireless Security Options
Field Description
None
Wireless security is not used.
WEP (Wired
Equivalent
Privacy)
This mode is only available if the “g and b” wireless mode is selected. This mode has been
superseded by WPA-PSK and WPA2-PSK, which should be selected if possible.
You can select the following WEP options:
WPA-PSK
(TKIP) + WPA2-
PSK (AES)
WPA Pre-Shared-Key (Wi-Fi Protected Access Pre-Shared Key) uses a pre-shared key
to perform the authentication and generate the initial data encryption keys. .Then, it
dynamically varies the encryption key. WPA-PSK (TKIP) implements most of the IEEE
802.11i standard and is designed to work with all wireless network interface cards, but not
all wireless access points. WPA2 implements the full standard, but will not work with
some older network cards. For a full explanation of WPA, see “Preparing a Computer for
Network Access:” in Appendix B.
WPA-802.1x User authentication is implemented using 802.1x and RADIUS servers. For a full
explanation of WPA, see “Preparing a Computer for Network Access:” in Appendix B.
This type of authentication is only available if the “g and b” wireless mode is selected.










