Netgear ME103 ME103 Reference Manual - Page 25
Understanding ME103 Wireless Security Options, Wireless Data, Security Options
UPC - 606449026375
View all Netgear ME103 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 25 highlights
Reference Manual for the ME103 802.11b ProSafe Wireless Access Point Understanding ME103 Wireless Security Options Unlike wired network data, your wireless data transmissions can be received well beyond your walls by anyone with a compatible adapter. For this reason, use the security features of your wireless equipment. The ME103 Access Point provides highly effective security features which are covered in detail in this chapter. Deploy the security features appropriate to your needs. ME103 802.11b ProSafe Wireless Access Point PWR LAN Wireless LAN Wireless Data Security Options Range: Up to 500 Feet MODELME103 1) Open System: Easy but no security 2) MAC Access List: No data security 3) WEP: Security but some vulnerabilities 4) 802.1x: Secure Figure 3-1: ME103 wireless data security options There are several ways you can enhance the security of your wireless network: • Restrict Access Based on MAC address. You can restrict access to only trusted PCs so that unknown PCs cannot wirelessly connect to the ME103. MAC address filtering adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed. • Turn Off the Broadcast of the Wireless Network Name (SSID). If you disable broadcast of the SSID, only devices that have the correct SSID can connect. This nullifies the wireless network 'discovery' feature of some products such as Windows XP, but the data is still fully exposed to a determined snoop using specialized test equipment like wireless sniffers. • Use WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared Key authentication and WEP data encryption will block all but the most determined eavesdropper. • Implement 802.1x. IEEE 802.1x provides very strong security. Although it can use the same data encryption scheme as WEP, it enables stronger authentication as well as the ability to dynamically vary the encryption keys. Basic Installation and Configuration 3-4 August 2003