Configuring the Wireless Network
Basic Settings
Cisco RV220W Administration Guide
58
3
•
WEP passphrase
(Optional)
—
Enter an alphanumeric phrase (longer than
eight characters for optimal security) and click
Generate Key
to generate
four unique WEP keys in the WEP Key fields below. Otherwise, you can
manually enter one or more keys in the fields.
•
WEP Key 1-4—
If you did not use the WEP Passphrase to generate keys,
enter one or more valid keys. Select a key to use as the shared key that
devices must have in order to use the wireless network. The length of the key
must be 5 ASCII characters (or 10 hexadecimal characters) for 64-bit WEP
and 13 ASCII characters (or 26 hexadecimal characters) for 128-bit WEP.
Valid hexadecimal characters are “0” to “9” and “A” to “F”.
STEP 5
Click
Save
to save your settings, or click
Cancel
to reload the page with the
current settings. Click
Back
to return to the
Wireless > Basic Settings
page.
If you need to configure the settings for another network, select it from the
Select
SSID
list, and then repeat this procedure.
MAC Filtering for Wireless Network Access Control
Use the
MAC Filtering
page to permit or deny access to the wireless network
based on the MAC (hardware) address of the requesting device. For example, you
can enter the MAC addresses of a set of PCs and only allow those PCs to access
the network. MAC filtering is configured separately for each virtual access point in
the router.
To open this page:
From the
Wireless > Basic Settings
page, select a network,
and then click
Edit MAC Filtering
.
STEP 1
If needed, select a different network in the
Select SSID
list.
STEP 2
Click
Enable
to enable MAC filtering, or click
Disable
to disable this feature. By
default, it is disabled, and a connection is allowed from any client, subject to the
security settings. The other fields on the page become available after you enable
this feature.
STEP 3
In the
Connection Control
section, choose one of the following options to limit
access to the selected network:
•
Block
—Deny connections from the endpoints identified in the
Connection
Control List
. Access is allowed from all other clients, subject to the security
settings.