Recording Basic Wireless Settings Setup Information - NETGEAR WIRELESS-G ROUTER WGR614V10 Reference Manual

Wireless-g router
Hide thumbs Also See for WIRELESS-G ROUTER WGR614V10:
Table of Contents

Advertisement

Table 2-2. Other Features That Enhance Security
Security Type
Disable the wireless router radio.
Turn off the broadcast of the wireless network
name SSID.
Restrict access based on MAC address.
Modify your firewall's rules.

Recording Basic Wireless Settings Setup Information

Before customizing your wireless settings, print this section, and record the following information.
If you are working with an existing wireless network, the person who set up or is responsible for
the network can provide this information. Otherwise, you must choose the settings for your
wireless network. Either way, record the settings for your wireless network in the spaces provided.
Safeguarding Your Network
Wireless-G Router WGR614v10 Reference Manual
Description
If you disable the wireless router radio, wireless
devices cannot communicate with the router at all.
You might disable this when you are away or when
other users of your network all use wired
connections.
For more information, see
Wireless Settings" on page
If you disable the broadcast of the SSID, only
devices that know the correct SSID can connect.
This nullifies the wireless network discovery feature
of some products such as Windows XP, but your data
is still fully exposed to an intruder using available
wireless eavesdropping tools.
For more information, see
Wireless Settings" on page
You can restrict access to only trusted computers so
that unknown computers cannot wirelessly connect
to the Wireless-G Router. MAC address filtering
adds an obstacle against unwanted access to your
network by the general public, but the data broadcast
over the wireless link is fully exposed. This data
includes your trusted MAC addresses, which can be
read and impersonated by a hacker.
For more information, see
Access by MAC Address" on page
By default, the firewall allows any outbound traffic
and prohibits any inbound traffic except for
responses to your outbound traffic. However, you
can modify the firewall's rules.
For more information, see
Firewall" on page
v1.0, February 2010
"Viewing Advanced
2-10.
"Viewing Advanced
2-10.
"Restricting Wireless
2-11.
"Understanding Your
2-17.
2-4

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents