Netgear FM114P FR114W Reference Manual - Page 80

Additional Notes, Security, Placement and Range - bridge

Page 80 highlights

Reference Manual for the Model FR114P, FR114W and FM114P Cable/DSL ProSafe Firewall 3. Obtain the Ethernet MAC address of the wireless interface card of each authorized PC. This address is usually printed on the card itself, or it may appear in the router's DHCP table. 4. Enter each MAC address into the Wireless Adapter Address box, then click Add. To delete a MAC address from the table, click on it to select it, then click the Delete button. Additional Notes Security Unlike wired network data, your wireless data transmissions can extend beyond your walls and can be received by anyone with a compatible adapter. For this reason, NETGEAR strongly recommends that you make use of the security features of your wireless equipment. As a minimum security precaution, you should change the SSID setting of all devices on your network from the factory setting to a unique password. Restricting access by MAC address filtering adds another obstacle against unwanted hosts joining your network. If your wireless PCs need Internet access but don't require access to your private wired network, disable bridging between the wireless and wired PCs To hinder a determined eavesdropper, you should enable Wired Equivalent Privacy (WEP) data encryption. However, there may be a significant degradation of the data throughput on the wireless link when WEP is enabled. For further information on wireless networking, refer to "Wireless Networking" in Appendix B, "Networks, Routing, and Firewall Basics." Placement and Range The operating distance or range of your wireless connection can vary significantly based on the physical placement of the wireless firewall. For best results, place your firewall: • near the center of the area in which your PCs will operate, • in an elevated location such as a high shelf, • away from potential sources of interference, such as PCs, microwaves, and cordless phones, • away from large metal surfaces. 6-6 Wireless

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150

Reference Manual for the Model FR114P, FR114W and FM114P Cable/DSL ProSafe Firewall
6-6
Wireless
3.
Obtain the Ethernet MAC address of the wireless interface card of each authorized PC.
This address is usually printed on the card itself, or it may appear in the router’s DHCP table.
4.
Enter each MAC address into the Wireless Adapter Address box, then click Add.
To delete a MAC address from the table, click on it to select it, then click the Delete button.
Additional Notes
Security
Unlike wired network data, your wireless data transmissions can extend beyond your walls and
can be received by anyone with a compatible adapter. For this reason, NETGEAR strongly
recommends that you make use of the security features of your wireless equipment. As a minimum
security precaution, you should change the SSID setting of all devices on your network from the
factory setting to a unique password. Restricting access by MAC address filtering adds another
obstacle against unwanted hosts joining your network.
If your wireless PCs need Internet access but don’t require access to your private wired network,
disable bridging between the wireless and wired PCs
To hinder a determined eavesdropper, you should enable Wired Equivalent Privacy (WEP) data
encryption. However, there may be a significant degradation of the data throughput on the wireless
link when WEP is enabled.
For further information on wireless networking, refer to
“Wireless Networking
” in
Appendix B,
“Networks, Routing, and Firewall Basics
.”
Placement and Range
The operating distance or range of your wireless connection can vary significantly based on the
physical placement of the wireless firewall. For best results, place your firewall:
near the center of the area in which your PCs will operate,
in an elevated location such as a high shelf,
away from potential sources of interference, such as PCs, microwaves, and cordless phones,
away from large metal surfaces.