Netgear MBR1210-1BMCNS MBR1210 User Manual (ENGLISH & FRANÇAIS) - Page 26
Wireless Security Options, Restrict access based on MAC address
View all Netgear MBR1210-1BMCNS manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 26 highlights
Mobile Broadband 11n Wireless Router MBR1210 User Manual Wireless Security Options Indoors, computers can connect over 802.11n wireless networks at a maximum range of up to 300 feet. Such distances can allow others outside your immediate area to access your network. Unlike wired network data, your wireless data transmissions can extend beyond your walls and can be received by anyone with a compatible adapter. For this reason, use the security features of your wireless equipment. The Mobile Broadband 11n Wireless Router provides highly effective security features, which are covered in detail in this chapter. Deploy the security features appropriate to your needs. Each router is preconfigured for WPA-PSK/WPA2-PSK mixed-mode, and comes with a unique SSID and passphrase for each router. There are several ways you can enhance the security of your wireless network: Figure 1. Wireless Security • Restrict access based on MAC address. You can allow only trusted PCs to connect so that unknown PCs cannot wirelessly connect to the router. Restricting access by MAC address adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed. • Turn off the broadcast of the wireless network name (SSID). If you disable broadcast of the SSID, only devices that have the correct SSID can connect. This nullifies wireless network "discovery" feature of some products, such as Windows XP, but the data is still exposed. • WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared Key authentication and WEP data encryption block all but the most determined eavesdropper. This data encryption mode has been superseded by WPA-PSK and WPA2-PSK. • WPA-PSK (TKIP), WPA2-PSK (AES). Wi-Fi Protected Access (WPA) using a pre-shared key to perform authentication and generate the initial data encryption keys. The very strong authentication along with dynamic per frame re-keying of WPA makes it virtually impossible to compromise. For more information about wireless technology, click the link to the online document Wireless Networking Basics in Appendix A. 26 | Chapter 2. Wireless Network Configuration