Netgear WAC730-Business User Manual - Page 37

WiFi Data Security Options, Con the WiFi Features and Security

Page 37 highlights

Dual-Band Wireless AC Access Point WAC720 and WAC730 User Manual WiFi Data Security Options Indoors, computers can connect over 802.11ac WiFi networks at a maximum range of 300 feet. Typically, a access point inside a building works best with devices within a 100-foot radius. Such distances can allow for others outside your immediate area to access your network. Unlike wired network data, your WiFi data transmissions can extend beyond your walls and can be received by anyone with a compatible WiFi device. For this reason, use the security features of your WiFi equipment. The access point provides highly effective security features that are covered in detail in this chapter. Deploy the security features appropriate to your needs. Figure 6. WiFi data security examples You can enhance the security of your WiFi network in several ways: • Use multiple BSSIDs combined with VLANs.You can configure combinations of VLANS and BSSIDs (security profiles) with stronger or less restrictive access security according to your requirements. For example, visitors could be given WiFi Internet access but be excluded from any access to your internal network. For information about how to configure BSSIDs, see Configure and Enable WiFi Security Profiles on page 39. • Restrict access based on MAC address. You can allow only trusted devices to connect so that unknown devices cannot connect over the WiFi to the access point. Restricting access by MAC address adds an obstacle against unwanted access to your network, but the data broadcast over the WiFi link is fully exposed. For information about how to restrict access by MAC address, see Manage MAC Address Filter Profiles in the Local MAC Address Database on page 50. • Turn off the broadcast of the WiFi network name (SSID). If you disable broadcast of the SSID, only devices with the correct SSID can connect. This nullifies the WiFi network discovery feature of some products, such as Windows XP, but the data is still exposed. For information about how to turn off broadcast of the SSID, see Configure and Enable WiFi Security Profiles on page 39. • WPA2-PSK (AES). Wi-Fi Protected Access version 2 (WPA2) provides the most reliable security with Advanced Encryption Standard (AES) encryption. This very strong authentication along with dynamic per-frame rekeying of WPA2 makes it virtually impossible to compromise.You can also use a combination of Temporal Key Integrity Protocol (TKIP) and AES encryption. WPA2-PSK uses a pre-shared key (PSK) for authentication. For more information, see Configure and Enable WiFi Security Profiles on page 39 and About WPA2-PSK and WPA-PSK & WPA2-PSK on page 46. Configure the WiFi Features and Security 37

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163

WiFi Data Security Options
Indoors, computers can connect over 802.11ac WiFi networks at a maximum range of 300 feet.Typically,
a access point inside a building works best with devices within a 100-foot radius. Such distances can allow
for others outside your immediate area to access your network.
Unlike wired network data, your WiFi data transmissions can extend beyond your walls and can be received
by anyone with a compatible WiFi device. For this reason, use the security features of your WiFi equipment.
The access point provides highly effective security features that are covered in detail in this chapter. Deploy
the security features appropriate to your needs.
Figure 6. WiFi data security examples
You can enhance the security of your WiFi network in several ways:
Use multiple BSSIDs combined with VLANs
.You can configure combinations of VLANS and BSSIDs
(security profiles) with stronger or less restrictive access security according to your requirements. For
example, visitors could be given WiFi Internet access but be excluded from any access to your internal
network. For information about how to configure BSSIDs, see
Configure and Enable WiFi Security
Profiles
on page 39.
Restrict access based on MAC address
.You can allow only trusted devices to connect so that
unknown devices cannot connect over the WiFi to the access point. Restricting access by MAC address
adds an obstacle against unwanted access to your network, but the data broadcast over the WiFi link
is fully exposed. For information about how to restrict access by MAC address, see
Manage MAC
Address Filter Profiles in the Local MAC Address Database
on page 50.
Turn off the broadcast of the WiFi network name (SSID)
. If you disable broadcast of the SSID, only
devices with the correct SSID can connect. This nullifies the WiFi network discovery feature of some
products, such as Windows XP, but the data is still exposed. For information about how to turn off
broadcast of the SSID, see
Configure and Enable WiFi Security Profiles
on page 39.
WPA2-PSK (AES)
.Wi-Fi Protected Access version 2 (WPA2) provides the most reliable security with
Advanced Encryption Standard (AES) encryption. This very strong authentication along with dynamic
per-frame rekeying of WPA2 makes it virtually impossible to compromise.You can also use a combination
of Temporal Key Integrity Protocol (TKIP) and AES encryption.
WPA2-PSK uses a pre-shared key (PSK) for authentication. For more information, see
Configure and
Enable WiFi Security Profiles
on page 39 and
About WPA2-PSK and WPA-PSK & WPA2-PSK
on page
46.
Configure the WiFi Features and Security
37
Dual-Band Wireless AC Access Point WAC720 and WAC730 User Manual