Linksys WAP54G Network Router User Manual


 
1312
Wireless-G Access Point
9. The second Security Settings screen, shown in Figure 5-8, shows the WEP
key. If you entered a passphrase, then the Key 1 field will display the auto-
matically generated WEP key. If you did not enter a passphrase, then enter
a WEP key in the Key 1 field. Each point in your wireless network must use
the same WEP key for the network to function properly. Click the Next but-
ton to continue or Back to return to the previous page.
Key 1. WEP keys enable you to create an encryption scheme for wire-
less networks. If the WEP key hasn’t been automatically generated, then
manually enter a set of values. (Do not leave the field blank, and do not
enter all zeroes, because they are not valid key values.) If you are using
64-bit WEP encryption, then each key must consist of exactly 10 hexa-
decimal characters in length. If you are using 128-bit WEP encryption,
then each key must consist of exactly 26 hexadecimal characters in
length. Valid hexadecimal characters are “0”-“9” and “A”-“F”.
Figure 5-8
10. The next screen (Figure 5-9) will allow you to review your settings. If the
settings are correct, click the Ye s button to save them. Click the No button
to exit the Setup Wizard and not save the settings.
11. At this point, the configuration performed with the Setup Wizard is com-
plete, as shown in Figure 5-10. To configure any other access points in your
network, you can run this Setup Wizard again. Click the Exit button to exit
the Setup Wizard.
The installation and configuration of the Access Point is complete. For
more advanced configuration, proceed to Chapter 5: Configuring the
Wireless-G Access Point.
Figure 5-10
Figure 5-9
Note: WEP encryption should be used when communicating over a
wireless network. Wireless transmissions are unprotected and WEP
encryption helps to make your wireless network safer to use.