Wireless Security - NETGEAR RangeMax WPN824v3 User Manual

Rangemax
Hide thumbs Also See for RangeMax WPN824v3:
Table of Contents

Advertisement

RangeMax Wireless Router WPN824v3 User Manual

Wireless Security

Unlike wired network data, your wireless data transmissions can be received well beyond your
walls by anyone with a compatible adapter. For this reason, use the security features of your
wireless equipment. The wireless router provides highly effective security features, which are
covered in detail in this chapter, along with setting up and testing your basic connectivity.
The following figure illustrates wireless security options.
4
Figure 2-3
Note: Indoors, computers can connect over 802.11b/g wireless networks at ranges of up
to 300 feet. Such distances can allow for others outside of your immediate area to
access your network.
There are several ways you can enhance the security of your wireless network.
Restrict access based on MAC address. You can restrict access to only trusted computers so
that unknown computers cannot wirelessly connect to the wireless router. MAC address
filtering adds an obstacle against unwanted access to your network, but the data broadcast over
the wireless link is fully exposed. For more information, see
page
2-11.
Turn off the broadcast of the wireless network name (SSID). If you disable broadcast of the
SSID, only devices that have the correct SSID can connect. This nullifies the wireless network
"discovery" feature of some products such as Windows XP, but the data is still fully exposed
to a determined snoop using specialized test equipment like wireless sniffers. For more
information, see
"Advanced Wireless Settings" on page
2-6
Wireless Data
Security Options
Range: Up to 300 foot radius
1. None. Easy but no security
2. MAC Access List. No data security
3. WEP. Security but vulnerable
4. WPA-PSK. Strong security
5. WPA2-PSK. Very strong security
v1.0, January 2008
"Setting Up an Access List" on
2-10.
Wireless Settings

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents