Implementing appropriate wireless security, Implement appropriate wireless security -2, Implementing appropriate – NETGEAR WPNT834 User Manual

Page 40

Advertising
background image

Reference Manual for the RangeMax 240 Wireless Router WPNT834

4-2

Wireless Configuration

v1.0, November 2005

Implementing Appropriate Wireless Security

Unlike wired network data, your wireless data transmissions can be received well beyond your
walls by anyone with a compatible adapter. For this reason, use the security features of your
wireless equipment. The WPNT834 router provides highly effective security features which are
covered in detail in this chapter. Deploy the security features appropriate to your needs.

There are several ways you can enhance the security of your wireless network.

Restrict Access Based on MAC address. You can restrict access to only trusted computers so
that unknown computers cannot wirelessly connect to the WPNT834. MAC address filtering
adds an obstacle against unwanted access to your network, but the data broadcast over the
wireless link is fully exposed.

Turn Off the Broadcast of the Wireless Network Name SSID. If you disable broadcast of
the SSID, only devices that have the correct SSID can connect. This nullifies the wireless
network ‘discovery’ feature of some products such as Windows XP, but the data is still fully
exposed to a determined snoop using specialized test equipment like wireless sniffers.

WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared
Key authentication and WEP data encryption block all but the most determined eavesdropper.

Note: Indoors, computers can connect over 802.11b/g wireless networks at ranges of up

to 300 feet. Such distances can allow for others outside of your immediate area to
access your network.

Figure 4-1

Advertising