Netgear WG602v2 WG602v2 User Manual - Page 26

Understanding WG602 v2 Wireless Security Options, Wireless Data, Security Options - driver

Page 26 highlights

Reference Manual for the WG602 v2 54 Mbps Wireless Access Point Understanding WG602 v2 Wireless Security Options Unlike wired network data, your wireless data transmissions can be received well beyond your walls by anyone with a compatible adapter. For this reason, use the security features of your wireless equipment. The WG602 v2 Access Point provides highly effective security features which are covered in detail in this chapter. Deploy the security features appropriate to your needs. Wireless Data Security Options WG602 v2 Range: Up to 300 Foot Radius 1) Open System: Easy but no security 2) MAC Access List: No data security 3) WEP: Secure but some vulnerabilities 4) WPA: Very strong security Figure 3-1: WG602 v2 wireless data security options There are several ways you can enhance the security of your wireless network: • Restrict Access Based on MAC Address. You can restrict access to only trusted PCs so that unknown PCs cannot wirelessly connect to the WG602 v2. MAC address filtering adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed. • Turn Off the Broadcast of the Wireless Network Name (SSID). If you disable broadcast of the SSID, only devices that have the correct SSID can connect. This nullifies the wireless network 'discovery' feature of some products such as Windows XP, but the data is still fully exposed to a determined snoop using specialized test equipment like wireless sniffers. • Use WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared Key authentication and WEP data encryption will block an eavesdropper but because the keys are static, a determined snoop can learn the keys in less than a day of eavesdropping. • Use WPA-PSK. Wi-Fi Protected Access (WPA) data encryption provides data security. WPA-PSK will block eavesdropping. Because this is a new standard, wireless device driver and software availability may be limited. However, WPA is not available in bridge mode. 3-3 Basic Installation and Configuration M-10181-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122

Reference Manual for the WG602 v2 54 Mbps Wireless Access Point
3-3
Basic Installation and Configuration
M-10181-03
Understanding WG602 v2 Wireless Security Options
Unlike wired network data, your wireless data transmissions can be received well beyond your
walls by anyone with a compatible adapter. For this reason, use the security features of your
wireless equipment. The WG602 v2 Access Point provides highly effective security features
which are covered in detail in this chapter. Deploy the security features appropriate to your needs.
Figure 3-1: WG602 v2 wireless data security options
There are several ways you can enhance the security of your wireless network:
Restrict Access Based on MAC Address.
You can restrict access to only trusted PCs so that
unknown PCs cannot wirelessly connect to the WG602 v2. MAC address filtering adds an
obstacle against unwanted access to your network, but the data broadcast over the wireless link
is fully exposed.
Turn Off the Broadcast of the Wireless Network Name (SSID).
If you disable broadcast of
the SSID, only devices that have the correct SSID can connect. This nullifies the wireless
network ‘discovery’ feature of some products such as Windows XP, but the data is still fully
exposed to a determined snoop using specialized test equipment like wireless sniffers.
Use WEP.
Wired Equivalent Privacy (WEP) data encryption provides data security. WEP
Shared Key authentication and WEP data encryption will block an eavesdropper but because
the keys are static, a determined snoop can learn the keys in less than a day of eavesdropping.
Use WPA-PSK.
Wi-Fi Protected Access (WPA) data encryption provides data security.
WPA-PSK will block eavesdropping. Because this is a new standard, wireless device driver
and software availability may be limited. However, WPA is not available in bridge mode.
1) Open System: Easy but no security
2) MAC Access List: No data security
3) WEP:
Secure but some vulnerabilities
4) WPA:
Very strong security
Wireless Data
Security Options
Range: Up to 300 Foot Radius
WG602 v2