Linksys WAG200G Network Router User Manual


 
Chapter 4
Advanced Configuration
15
Wireless-G ADSL Home Gateway
Wireless > Wireless Access
Wireless access can be filtered by using the MAC addresses
of the wireless devices transmitting within your network’s
radius.
Wireless > Wireless Access
Wireless Network Access
Allow All/Restrict Access
To filter wireless users by MAC
address, either permitting or blocking access, select Restrict
Access. If you do not wish to filter users by MAC address,
keep the default, Allow All
.
Prevent listed computers from accessing the wireless
network Select this to block wireless access by MAC
address. This setting is selected by default.
Permit only listed computers to access the wireless
network Select this to allow wireless access by MAC
address.
Edit MAC Address Access List Click this to open the MAC
Address Filter List screen.
MAC Address Filter List
MAC Address Filter List
MAC 01-20 Enter the MAC addresses of the devices
whose wireless access you want to block or allow.
Wireless Client MAC List Click this to open the
Wireless Client List screen.
Wireless Client List
Wireless Client List
This screen lists the MAC addresses of the wireless
devices. Select Enable MAC Filter for any device you
want to add to the MAC Address Filter List. Then click
Update Filter List.
To retrieve the most up-to-date information, click
Refresh. To exit this screen and return to the Wireless
MAC Filter List screen, click Close.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.
Wireless > Advanced Wireless Settings
The Advanced Wireless Settings screen is used to set up the
Gateway’s advanced wireless functions. These settings
should only be adjusted by an expert administrator as
incorrect settings can reduce wireless performance.
Wireless > Advanced Wireless Settings
Advanced Wireless
Wireless-G Settings
Authentication Type The default is Auto, which allows
either Open System or Shared Key authentication to be
used. With Open System authentication, the sender and
the recipient do NOT use a WEP key for authentication.
With Shared Key authentication, the sender and recipient