Implement appropriate wireless security, Implement appropriate wireless security -2, Implement appropriate – NETGEAR MR814 v3 User Manual

Page 42: Wireless security, And configu, Instructions in

Advertising
background image

Reference Manual for the MR814 v3 Cable/DSL Wireless Router

4-2

Wireless Configuration

202-10039-01

Implement Appropriate Wireless Security

Unlike wired network data, your wireless data transmissions can be received well beyond your
walls by anyone with a compatible adapter. For this reason, use the security features of your
wireless equipment. The MR814 v3 router provides highly effective security features which are
covered in detail in this chapter. Deploy the security features appropriate to your needs.

Figure 4-1: MR814 v3 wireless data security options

There are several ways you can enhance the security of you wireless network.

Restrict Access Based on MAC Address. You can restrict access to only trusted computers o
that unknown computers cannot wirelessly connect to the MR814 v3. MAC address filtering
adds an obstacle against unwanted access to your network, but the data broadcast over the
wireless link is fully exposed.

WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared
Key authentication and WEP data encryption will block all but the most determined
eavesdropper.

WPA-PSK. Wi-Fi Protected Access (WPA) data encryption provides strong data security.
WPA-PSK will block eavesdropping. Because this is a new standard, wireless device driver
and software availability may be limited.

Note:

Indoors, computers can connect over 802.11 wireless networks at ranges

of up to 300 feet.

Such distances can allow for others outside of your immediate area to

access your network.

:LUHOHVV'DWD
6HFXULW\2SWLRQV

5DQJHXSWRIRRWUDGLXV

 2SHQV\VWHPHDV\EXWQRVHFXULW\

 0$&DFFHVVOLVWQRGDWDVHFXULW\

 :(3VHFXULW\EXWVRPHSHUIRUPDQFHLPSDFW

 :3$36.YHU\VWURQJVHFXULW\

MR814 v3

Advertising