16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

532 Chapter 21<br />

Figure 21.37 : The require security properties window<br />

Figure 21.38 : The security methods options<br />

the textbox ( Figure 21.39 ). This can be a combination of up to 24 letters and numbers,<br />

but special characters are not allowed. Make sure that you remember this key as it will be<br />

used later when the router is configured.<br />

Next, click the OK button in Windows XP or the Close button in Windows 2000.<br />

Select the Tunnel Setting tab on the New Rule Properties window. Select The tunnel endpoint<br />

is specified by this IP address and enter the external IP address of the WRV54G, as shown in<br />

Figure 21.40 . This is the IP address your router uses to communicate with the Internet.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!