Netgear DGFV338 DGFV338 Reference Manual - Page 54

Restrict Access Based on MAC Address., Turn Off the Broadcast of the Wireless Network Name SSID.

Page 54 highlights

DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual Unlike wired network data, your wireless data transmissions can extend beyond your walls and can be received by anyone with a compatible adapter. For this reason, use the security features of your wireless equipment. The wireless firewall provides highly effective security features which are covered in detail in this chapter. Figure 3-1 DGFV338 Á?aM?™a +Á.?wjËo 8‰ÁjjÄÄˉÁj jÁÜjÁ 3:5 $&7 7(67 $/(57 02).4%2 $&7 $/(57 -/$%-   /1.$&7 ).4%2.%4   ,/#!, #  8¤¤|+   /1.$&7 7,!. LUHOHVV'DWD 6HFXULW\2SWLRQV 5DGLXV8SWR)HHW  .O3ECURITY%ASYBUTNOSECURITY  -!#!CCESS,IST.ODATASECURITY  7%03ECURITYBUTSOMEPERFORMANCE IMPACT  70!70!OR70!70! 03+6ERY STRONGSECURITY There are several ways you can enhance the security of your wireless network: • Restrict Access Based on MAC Address. You can allow only trusted PCs to connect so that unknown PCs cannot wirelessly connect to the DGFV338. Restricting access by MAC address adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed. • Turn Off the Broadcast of the Wireless Network Name SSID. If you disable broadcast of the SSID, only devices that have the correct SSID can connect. This nullifies wireless network "discovery" feature of some products, such as Windows XP, but the data is still exposed. • WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared Key authentication and WEP data encryption will block all but the most determined eavesdropper. • WPA/WPA2 with RADIUS or WPA/WPA2-PSK. Wi-Fi Protected Access (WPA and WPA2) data encryption provides data security. The very strong authentication along with dynamic per frame rekeying of WPA and WPA2 make it virtually impossible to compromise. Because this is a new standard, wireless device driver and software availability may be limited. 3-2 Wireless Configuration v1.0, April 2007

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212

DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
3-2
Wireless Configuration
v1.0, April 2007
Unlike wired network data, your wireless data transmissions can extend beyond your walls and
can be received by anyone with a compatible adapter. For this reason, use the security features of
your wireless equipment. The wireless firewall provides highly effective security features which
are covered in detail in this chapter.
There are several ways you can enhance the security of your wireless network:
Restrict Access Based on MAC Address.
You can allow only trusted PCs to connect so that
unknown PCs cannot wirelessly connect to the DGFV338. Restricting access by MAC address
adds an obstacle against unwanted access to your network, but the data broadcast over the
wireless link is fully exposed.
Turn Off the Broadcast of the Wireless Network Name SSID.
If you disable broadcast of
the SSID, only devices that have the correct SSID can connect. This nullifies wireless network
“discovery” feature of some products, such as Windows XP, but the data is still exposed.
WEP.
Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared
Key authentication and WEP data encryption will block all but the most determined
eavesdropper.
WPA/WPA2 with RADIUS or WPA/WPA2-PSK.
Wi-Fi Protected Access (WPA and
WPA2) data encryption provides data security. The very strong authentication along with
dynamic per frame rekeying of WPA and WPA2 make it virtually impossible to compromise.
Because this is a new standard, wireless device driver and software availability may be
limited.
Figure 3-1
DGFV338