0

Out of 0 Ratings

Owner's of the Linksys Network Card WRE54G gave it a score of 0 out of 5. Here's how the scores stacked up:
  • Reliability

    0 out of 5
  • Durability

    0 out of 5
  • Maintenance

    0 out of 5
  • Performance

    0 out of 5
  • Ease of Use

    0 out of 5
of 41
 
12
Chapter 5: Setting Up the Wireless-G Range Expander
Wireless-G Range Expander
7. The Security Settings screen will appear next, if you have not entered this information already. From this
screen, you can set the level of encryption on your network, along with entering the appropriate passphrases
and/or encryption keys.
If your network’s WEP encryption uses a passphrase, enter it here. The passphrase can consist of no more
than 16 alphanumeric characters.
When entering the WEP key directly, it should be no more than 10 hexadecimal characters in length for 64-bit
encryption or 26 hexadecimal characters in length for 128-bit encryption. Hexadecimal characters are the
letters "A" through "F" and the numbers "0" through "9". All points in your wireless network must use the
same WEP key to utilize WEP encryption.
Click the Next button to continue or Exit to exit the Setup Wizard.
8. The Configure Network Address Settings screen will appear next. Enter an IP Address, Subnet Mask, the IP
Address of your network Gateway, and an Expander Name. Then, click the Next button to continue or Back to
return to the previous page.
IP Address. This IP address must be unique to your network. (The default IP address is 192.168.1.240.)
Subnet Mask. The Range Expander's Subnet Mask must be the same as your network.
Gateway. This IP address should be the IP address of the gateway device that allows for contact between
the Internet and the local network.
Expander Name. You can assign the Range Expander any name up to 32 characters in length, such as its
location (garage, downstairs, living room, etc.).
Figure 5-9: The Security Settings screen
Figure 5-10: The Configure Network Address
Settings screen
bit - a binary digit.
gateway - a device that interconnects networks with different,
incompatible communications protocols.