User Manual
Table Of Contents
- NBG-418N v2
- User’s Guide
- Introduction
- The Web Configurator
- Connection Wizard
- Modes
- Tutorials
- 5.1 Overview
- 5.2 How to Connect to the Internet from an AP
- 5.3 Configure Wireless Security Using WPS on both your NBG-418N v2 and Wireless Client
- 5.4 Enable and Configure Wireless Security without WPS on your NBG-418N v2
- 5.5 Using Multiple SSIDs on the NBG-418N v2
- 5.6 Installing UPnP in Windows 7 Example
- 5.7 Using Bandwidth Management on the NBG-418N v2
- Technical Reference
- Wireless LAN
- WAN
- LAN
- DHCP Server
- Network Address Translation
- Dynamic DNS
- Static Route
- Firewall
- Content Filter
- Remote Management
- Universal Plug-and-Play (UPnP)
- Bandwidth MGMT
- System
- Logs
- Tools
- Sys OP Mode
- Language
- Troubleshooting
- Customer Support
- IP Addresses and Subnetting
- Pop-up Windows, JavaScripts and Java Permissions
- Setting Up Your Computer’s IP Address
- Wireless LANs
- Common Services
- Legal Information
- Index
Chapter 6 Wireless LAN
NBG-418N v2 User’s Guide
63
This type of security does not protect the information that is sent in the wireless network. Furthermore,
there are ways for unauthorized devices to get the MAC address of an authorized wireless client. Then,
they can use that MAC address to use the wireless network.
6.3.4 Enc ryption
Wireless networks can use encryption to protect the information that is sent in the wireless network.
Encryption is like a secret code. If you do not know the secret code, you cannot understand the
message.
For example, if users do not log in to the wireless network, you can choose no encryption, WEP, WPA-PSK,
or WPA2-PSK.
Usually, you should set up the strongest encryption that every wireless client in the wireless network
supports. Suppose the wireless network has two wireless clients. Device A only supports WEP, and device
B supports WEP and WPA2-PSK. Therefore, you should set up WEP in the wireless network.
Note: It is recommended that wireless networks use WPA2-PSK, or stronger encryption. IEEE
802.1x and WEP encryption are better than none at all, but it is still possible for
unauthorized devices to figure out the original information pretty quickly.
Many types of encryption use a key to protect the information in the wireless network. The longer the
key, the stronger the encryption. Every wireless client in the wireless network must have the same key.
6.3.5 WPS
WiFi Protected Setup (WPS) is an industry standard specification, defined by the WiFi Alliance. WPS
allows you to quickly set up a wireless network with strong security, without having to configure security
settings manually. Depending on the devices in your network, you can either press a button (on the
device itself, or in its configuration utility) or enter a PIN (Personal Identification Number) in the devices.
Then, they connect and set up a secure network by themselves. See how to set up a secure wireless
network using WPS in the
Section 5.3 on page 46.
6.4 Ge ne ra l Wire le ss LAN Sc re e n
Use this screen to enable the Wireless LAN, enter the SSID and select the wireless security mode.
Note: If you are configuring the NBG-418N v2 from a computer connected to the wireless LAN
and you change the NBG-418N v2’s SSID, channel or security settings, you will lose your
wireless connection when you press Apply to confirm. You must then change the
wireless settings of your computer to match the NBG-418N v2’s new settings.
Table 18 Types of Encryption for Each Type of Authentication
NO AUTHENTICATION
We a ke st No Security
Static WEP
WPA-PSK
Strong e st WPA2-PSK