Linksys WCG200 Network Router User Manual


 
35
Wireless-G Cable Gateway
128-Bit Encryption
Default Key. Select which WEP key (1-4) will be used when the Router sends
data. Make sure the receiving device is using the same key.
Passphrase for Keys. Instead of manually entering WEP keys, you can enter a
Passphrase. This Passphrase is used to generate one or more WEP keys. It is
case-sensitive and should not be longer than 16 alphanumeric characters. (This
Passphrase function is compatible with Linksys wireless products only. If you
want to communicate with non-Linksys wireless products, enter the WEP key
manually on the non-Linksys wireless products.) After you enter the
Passphrase, click the Generate button to create WEP keys.
Wireless WEP Keys 1-4. WEP keys enable you to create an encryption scheme
for wireless LAN transmissions. If you are not using a Passphrase, then manu-
ally enter a set of values. (Do not leave a key field blank, and do not enter all
zeroes. These are not valid key values.)
For 128-bit WEP encryption, the key must be exactly 26 hexadecimal charac-
ters in length. Valid hexadecimal characters are “0”-“9” and “A”-“F”.
When finished making your changes on this tab, click the Save Settings button
to save these changes, or click the Cancel Changes button to undo your
changes.
34
Wireless Network Access
Wireless Network Access. If this function is enabled, only the computers on
the list will be allowed access to the wireless network. To add a computer to the
network, click Enabled to enable the function. Then, enter the MAC address in
the fields, and click the Select MAC Address From Networked Computers
button, and the screen in Figure 5-9 will appear.
Select the MAC Address from the list, and click the Add button. Click the
Refresh button if you want to refresh the screen. Click the Close button to
return to the previous screen.
When finished making your changes on this tab, click the Save Settings button
to save these changes, or click the Cancel Changes button to undo your
changes.
Figure 5-8
Figure 5-9
Figure 5-7