Netgear DGN2200 DGN2200 User Manual - Page 24

Wireless Security Options - use with at t

Page 24 highlights

Wireless-N 300 Modem Router DGN2200 User Manual Wireless Security Options Indoors, computers can connect over 802.11g wireless networks at a maximum range of up to 300 feet. Such distances can allow for others outside your immediate area to access your network. Unlike wired network data, your wireless data transmissions can extend beyond your walls and can be received by anyone with a compatible adapter. For this reason, use the security features of your wireless equipment. The wireless-N modem router provides highly effective security features, which are covered in detail in this chapter. Deploy the security features appropriate to your needs. There are several ways you can enhance the security of your wireless network: • Restrict access based on MAC address. You can allow only trusted PCs to connect so that unknown PCs cannot wirelessly connect to the wireless-N modem router. Restricting access by MAC address adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed (see "Restricting Wireless Access to Your Network" on page 6-11). • Turn off the broadcast of the wireless network name SSID. If you disable broadcast of the SSID, only devices that have the correct SSID can connect. This nullifies wireless network discovery feature of some products, such as Windows XP, but the data is still exposed (see "Hiding your wireless network name (SSID)" on page 6-12). • WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared Key authentication and WEP data encryption block all but the most determined eavesdropper. This data encryption mode has been superseded by WPA-PSK and WPA2-PSK (see "Configuring WEP" on page 2-9). • WPA-PSK (TKIP) + WPA2-PSK (AES). Wi-Fi Protected Access (WPA) using a pre-shared key to perform authentication and generate the initial data encryption keys. The very strong authentication along with dynamic per frame re-keying of WPA makes it virtually impossible to compromise (see "Configuring WPA-PSK (TKIP) + WPA2-PSK (AES) Security" on page 2-8). 2-3 Configuring Your Wireless Network and Security Settings v1.0, March 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124

Wireless-N 300 Modem Router DGN2200 User Manual
2-3
Configuring Your Wireless Network and Security Settings
v1.0, March 2010
Wireless Security Options
Indoors, computers can connect over 802.11g wireless networks at a maximum range of up to
300 feet. Such distances can allow for others outside your immediate area to access your network.
Unlike wired network data, your wireless data transmissions can extend beyond your walls and
can be received by anyone with a compatible adapter. For this reason, use the security features of
your wireless equipment. The wireless-N modem router provides highly effective security
features, which are covered in detail in this chapter. Deploy the security features appropriate to
your needs.
There are several ways you can enhance the security of your wireless network:
Restrict access based on MAC address
. You can allow only trusted PCs to connect so that
unknown PCs cannot wirelessly connect to the wireless-N modem router. Restricting access
by MAC address adds an obstacle against unwanted access to your network, but the data
broadcast over the wireless link is fully exposed (see
“Restricting Wireless Access to Your
Network” on page 6-11
).
Turn off the broadcast of the wireless network name SSID
. If you disable broadcast of the
SSID, only devices that have the correct SSID can connect. This nullifies wireless network
discovery feature of some products, such as Windows XP, but the data is still exposed (see
“Hiding your wireless network name (SSID)” on page 6-12
).
WEP
. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared
Key authentication and WEP data encryption block all but the most determined eavesdropper.
This data encryption mode has been superseded by WPA-PSK and WPA2-PSK (see
“Configuring WEP” on page 2-9
).
WPA-PSK (TKIP) + WPA2-PSK (AES)
. Wi-Fi Protected Access (WPA) using a pre-shared
key to perform authentication and generate the initial data encryption keys. The very strong
authentication along with dynamic per frame re-keying of WPA makes it virtually impossible
to compromise (see
“Configuring WPA-PSK (TKIP) + WPA2-PSK (AES) Security” on
page 2-8
).