Netgear FVM318 FVM318 Reference Manual - Page 40

Restricting Access Based on the Wireless Card Access List, Choosing Authentication and Security

Page 40 highlights

Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall Restricting Access Based on the Wireless Card Access List Figure 3-3: Wireless Card Access List menu This setting determines which hardware devices will be allowed to connect to the firewall. • Everyone. The FVM318 will not restrict wireless access based on MAC address. • Trusted PCs Only. Requires specifying the MAC address in the list if trusted PC MAC addresses before any device connecting wirelessly to the FVM318 will be allowed to connect to the firewall. Choosing Authentication and Security Encryption Methods Figure 3-4: Encryption Strength Note: Whichever Security Encryption settings you choose for the FVM318 will be enforced for all wireless connections. For example, if you choose IPSec, then the only wireless connections allowed will be those established according to the VPN tunnel settings you specify. Automatic Authentication Scheme Selection The FVM318 automatically selects the wireless appropriate authentication scheme based on the encryption strength you choose. • For WEP encryption, the FVM318 will enforce the shared key wireless authentication scheme. • For IPSec, the FVM318 will enforce the IPSec pre-shared key authentication scheme. • For Disable, the FVM318 will use the Open System authentication scheme. 3-4 Wireless Configuration

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184

Reference Manual for the Model FVM318 Cable/DSL ProSafe Wireless VPN Security Firewall
3-4
Wireless Configuration
Restricting Access Based on the Wireless Card Access List
Figure 3-3:
Wireless Card Access List menu
This setting determines which hardware devices will be allowed to connect to the firewall.
Everyone. The FVM318 will not restrict wireless access based on MAC address.
Trusted PCs Only. Requires specifying the MAC address in the list if trusted PC MAC
addresses before any device connecting wirelessly to the FVM318 will be allowed to connect
to the firewall.
Choosing Authentication and Security Encryption Methods
Figure 3-4:
Encryption Strength
Automatic Authentication Scheme Selection
The FVM318 automatically selects the wireless appropriate authentication scheme based on the
encryption strength you choose.
For WEP encryption, the FVM318 will enforce the shared key wireless authentication scheme.
For IPSec, the FVM318 will enforce the IPSec pre-shared key authentication scheme.
For Disable, the FVM318 will use the Open System authentication scheme.
Note:
Whichever Security Encryption settings you choose for the
FVM318 will be
enforced for all wireless connections. For example, if you choose IPSec, then the only
wireless connections allowed will be those established according to the VPN tunnel
settings you specify.