Netgear FVM318 FVM318 Reference Manual - Page 38

Implement Appropriate Wireless Security

Page 38 highlights

Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall Implement Appropriate Wireless Security Unlike wired network data, your wireless data transmissions can extend beyond your walls and can be received by anyone with a compatible adapter. For this reason, use the security features of your wireless equipment. Note: Indoors, computers can connect over 802.11b wireless networks at a maximum range of up to 500 feet. Such distances can allow for others outside of your immediate area to access your network. It is important to take appropriate steps to secure your network from unauthorized access. The FVM318 firewall provides highly effective security features which are covered in detail in this chapter. Deploy the security features appropriate to your needs. FVM318 Wireless Data Security Options Range: Up to 500 Feet 1) Open System: Easy but no security FVM318 Cable/DSL ProSafeWirelessVPN Security Firewall PWR TEST IN TER N ET LNK W LA N LO CA L MODEL FVM318 100 ACT Enable LNK/ACT 1 2 3 4 5 6 7 8 2) MAC Access List: No data security 3) WEP: Limited security but performance impact 4) IPSec (VPN): Highly secure, more reliable, and better performance Figure 3-1: FVM318 wireless data security options Restricting access by MAC address filtering adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed. To block a determined eavesdropper, you should use one of the data encryption options of the firewall. Wired Equivalent Privacy (WEP) data encryption provides some security. However, a determined intruder can compromise WEP, there may be degradation of the data throughput on the wireless link, and WEP configurations can be less reliable. Unique to the FVM318, you can use the highly secure, reliable, high performance IPSec VPN communications protocols for your wireless connection. 3-2 Wireless Configuration

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184

Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
3-2
Wireless Configuration
Implement Appropriate Wireless Security
Unlike wired network data, your wireless data transmissions can extend beyond your walls and
can be received by anyone with a compatible adapter. For this reason, use the security features of
your wireless equipment.
Figure 3-1:
FVM318 wireless data security options
Restricting access by MAC address filtering adds an obstacle against unwanted access to your
network, but the data broadcast over the wireless link is fully exposed. To block a determined
eavesdropper, you should use one of the data encryption options of the firewall. Wired Equivalent
Privacy
(WEP) data encryption provides some security. However, a determined intruder can
compromise WEP, there may be degradation of the data throughput on the wireless link, and WEP
configurations can be less reliable. Unique to the FVM318, you can use the highly secure, reliable,
high performance IPSec VPN communications protocols for your wireless connection.
Note:
Indoors, computers can connect over 802.11b wireless networks at a
maximum range of up to 500 feet.
Such distances can allow for others outside of your
immediate area to access your network. It is important to take appropriate steps to
secure your network from unauthorized access. The FVM318 firewall provides highly
effective security features which are covered in detail in this chapter. Deploy the
security features appropriate to your needs.
FVM318
FVM318
1) Open System: Easy but no security
2) MAC Access List: No data security
3) WEP: Limited security but performance impact
4) IPSec (VPN): Highly secure, more reliable, and better performance
FVM318 Wireless
Data Security Options
Range: Up to 500 Feet