User Guide
Page 6
... to the router 4-2 My broadband modem already uses a built-in router 4-2 Software Solutions...4-3 I would like to test to see if my Internet connection is live 4-3 I cannot access the Web-based Configuration Utility for the router 4-4 How do I extend my wireless network to : RESTRICTING WIRELESS ACCESS TO SPECIFIC USERS 3-55 WIRELESS Page Action Buttons 3-56 The SECURITY Configuration Page...
... to the router 4-2 My broadband modem already uses a built-in router 4-2 Software Solutions...4-3 I would like to test to see if my Internet connection is live 4-3 I cannot access the Web-based Configuration Utility for the router 4-4 How do I extend my wireless network to : RESTRICTING WIRELESS ACCESS TO SPECIFIC USERS 3-55 WIRELESS Page Action Buttons 3-56 The SECURITY Configuration Page...
User Guide
Page 35
Section 3 Configuration Accessing the Web-Based Configuration Utility Logging In 1 Once the router is admin. 3 Enter the Password. Once you have logged in the example below . 4 Click OK to enter the Web-based Configuration Utility. See below ):... Web-based Configuration Utility. 3-2 WR850 The BASIC configuration page will appear (the WR850GP login window is motorola. Press the Enter key. In the URL field enter http://192.168.10.1 (the router's default IP address). The default factory setting is shown in , for security reasons you should change the User ID and Password.
Section 3 Configuration Accessing the Web-Based Configuration Utility Logging In 1 Once the router is admin. 3 Enter the Password. Once you have logged in the example below . 4 Click OK to enter the Web-based Configuration Utility. See below ):... Web-based Configuration Utility. 3-2 WR850 The BASIC configuration page will appear (the WR850GP login window is motorola. Press the Enter key. In the URL field enter http://192.168.10.1 (the router's default IP address). The default factory setting is shown in , for security reasons you should change the User ID and Password.
User Guide
Page 91
... some combinations. 3-58 WR850 AES encryption requires WPA, WPA-PSK, WPA2, or WPA2PSK authentication. If you use "keys" to increase security. Section 3 Configuration You will communicate. WIRELESS AUTHENTICATION METHODS 1) 802.11 Authentication, which re-uses encryption keys as identification criteria. 2) 802.1X Authentication, which it is called WPA-PSK. WPA2-PSK, like WPA-PSK...
... some combinations. 3-58 WR850 AES encryption requires WPA, WPA-PSK, WPA2, or WPA2PSK authentication. If you use "keys" to increase security. Section 3 Configuration You will communicate. WIRELESS AUTHENTICATION METHODS 1) 802.11 Authentication, which re-uses encryption keys as identification criteria. 2) 802.1X Authentication, which it is called WPA-PSK. WPA2-PSK, like WPA-PSK...
User Guide
Page 92
...), and a WPA Pass Phrase (below). 2) WPA-PSK does not require the use wireless devices with the WR850 that are not capable of supporting WPA, then you should establish security measures that are the options for backward compatibility. If you intend to use of a ... order to support clients with the capabilities of those devices. FACTORY DEFAULT: Disabled RECOMMENDED SETTING: Enabled Enables WPA2-PSK (Pre-Shared Key) authentication. Configuration Section 3 SECURITY Page - NOTES: 1) WPA2-PSK requires a WPA Encryption method (below), and a WPA Pass Phrase (below). 2) WPA2-PSK...
...), and a WPA Pass Phrase (below). 2) WPA-PSK does not require the use wireless devices with the WR850 that are not capable of supporting WPA, then you should establish security measures that are the options for backward compatibility. If you intend to use of a ... order to support clients with the capabilities of those devices. FACTORY DEFAULT: Disabled RECOMMENDED SETTING: Enabled Enables WPA2-PSK (Pre-Shared Key) authentication. Configuration Section 3 SECURITY Page - NOTES: 1) WPA2-PSK requires a WPA Encryption method (below), and a WPA Pass Phrase (below). 2) WPA2-PSK...
User Guide
Page 93
... WPA2, WPA-PSK, or WPA2-PSK is being entered. For security reasons, the pass phrase is not immediately readable, while it into the wireless devices with which the WR850 will be used to generate encryption keys, with WPA-PSK or WPA2-PSK authentication. NOTE: A WPA Pass...or WPA2-PSK is enabled separately from WPA Encryption (below). FACTORY DEFAULT: TKIP RECOMMENDED SETTING: TKIP + AES Sets the pass phrase (or Pre-Shared Key) that will communicate. Section 3 Configuration Field WPA2-PSK: (continued) WPA Encryption: (RECOMMENDED) WPA Pass Phrase: (RECOMMENDED) Description 3) WPA2-PSK ...
... WPA2, WPA-PSK, or WPA2-PSK is being entered. For security reasons, the pass phrase is not immediately readable, while it into the wireless devices with which the WR850 will be used to generate encryption keys, with WPA-PSK or WPA2-PSK authentication. NOTE: A WPA Pass...or WPA2-PSK is enabled separately from WPA Encryption (below). FACTORY DEFAULT: TKIP RECOMMENDED SETTING: TKIP + AES Sets the pass phrase (or Pre-Shared Key) that will communicate. Section 3 Configuration Field WPA2-PSK: (continued) WPA Encryption: (RECOMMENDED) WPA Pass Phrase: (RECOMMENDED) Description 3) WPA2-PSK ...
User Guide
Page 94
... enables 802.11 authentication. NOTE: The WR850 currently offers only one interface; future versions of the encryption keys for wireless clients. This interface will force all configuration options related to WPA authentication (below , to be the same as... authentication is used as identification criteria for identification. NOTE: Selecting Shared will be configured. Configuration Section 3 SECURITY Page - Enables a "shared" authentication method, whereby encryption keys are not capable of the WR850 with devices that are re-used , and that Wired Equivalent Privacy (...
... enables 802.11 authentication. NOTE: The WR850 currently offers only one interface; future versions of the encryption keys for wireless clients. This interface will force all configuration options related to WPA authentication (below , to be the same as... authentication is used as identification criteria for identification. NOTE: Selecting Shared will be configured. Configuration Section 3 SECURITY Page - Enables a "shared" authentication method, whereby encryption keys are not capable of the WR850 with devices that are re-used , and that Wired Equivalent Privacy (...
User Guide
Page 97
...the pass phrase is not immediately readable while it into the wireless devices with which the WR850 will communicate. After you apply your WPA Pass Phrase and enter it is strongly recommended, for stronger security. A WPA Pass Phrase of at the bottom of the page...) WPA Pass Phrase: (RECOMMENDED) Description Sets the encryption method(s) to be used to generate encryption keys, with WPA, WPA2, WPAPSK, or WPA2-PSK authentication. • Selecting TKIP engages Temporal Key Integrity Protocol. • Selecting AES engages Advanced Encryption Standard. • Selecting TKIP + AES allows...
...the pass phrase is not immediately readable while it into the wireless devices with which the WR850 will communicate. After you apply your WPA Pass Phrase and enter it is strongly recommended, for stronger security. A WPA Pass Phrase of at the bottom of the page...) WPA Pass Phrase: (RECOMMENDED) Description Sets the encryption method(s) to be used to generate encryption keys, with WPA, WPA2, WPAPSK, or WPA2-PSK authentication. • Selecting TKIP engages Temporal Key Integrity Protocol. • Selecting AES engages Advanced Encryption Standard. • Selecting TKIP + AES allows...
User Guide
Page 98
Leave this periodic update. These keys would not be secure. 3) WEP Network Keys need not be entered if 802.1X Authentication (above) is Enabled, since the RADIUS server will dynamically generate keys. 4) If WEP Encryption and WPA Encryption (above ) are concurrently Enabled, Network Key slots 1 and 4 are reserved for WPA functions and the Current WEP Network...
Leave this periodic update. These keys would not be secure. 3) WEP Network Keys need not be entered if 802.1X Authentication (above) is Enabled, since the RADIUS server will dynamically generate keys. 4) If WEP Encryption and WPA Encryption (above ) are concurrently Enabled, Network Key slots 1 and 4 are reserved for WPA functions and the Current WEP Network...
User Guide
Page 110
... than one WEP Network Key entered. WR850 4-5 Some wireless cards do I match WEP keys between the router and my wireless clients? For compatibility with at least one WEP Network Key is entered in turn cannot accept a WPA Pass Phrase. Using the utility provided with your wireless client, you must be enabled on the SECURITY Page of the Web...
... than one WEP Network Key entered. WR850 4-5 Some wireless cards do I match WEP keys between the router and my wireless clients? For compatibility with at least one WEP Network Key is entered in turn cannot accept a WPA Pass Phrase. Using the utility provided with your wireless client, you must be enabled on the SECURITY Page of the Web...
User Guide
Page 122
...and hyperlink to information. The bandwidth depends on a WLAN. WEP uses keys to products supporting IEEE 802.11b/g. Wireless fidelity (pronounced why'-fy) brand name applied to encrypt and decrypt transmitted data. A security regimen developed by IEEE for a LAN. World Wide Web. Wired ...-Fi Multimedia, which optimizes the multimedia (e.g., voice, video) sharing over a public network (usually the Internet) to provide a secure and fast connection; Wireless LAN. Wi-Fi Protected Access. usually to another acronym commonly used for example, a leased line), but is part of IEEE...
...and hyperlink to information. The bandwidth depends on a WLAN. WEP uses keys to products supporting IEEE 802.11b/g. Wireless fidelity (pronounced why'-fy) brand name applied to encrypt and decrypt transmitted data. A security regimen developed by IEEE for a LAN. World Wide Web. Wired ...-Fi Multimedia, which optimizes the multimedia (e.g., voice, video) sharing over a public network (usually the Internet) to provide a secure and fast connection; Wireless LAN. Wi-Fi Protected Access. usually to another acronym commonly used for example, a leased line), but is part of IEEE...