Netgear WGX102v2 WGX102v2 Reference Manual - Page 44

Implementing Appropriate Wireless Security, Wireless Data Security Options - device driver

Page 44 highlights

Reference Manual for the 54 Mbps Wall-Plugged Wireless Range Extender WGX102 Implementing Appropriate Wireless Security Note: Indoors, computers can connect over 802.11b/g wireless networks at ranges of up to 300 feet. Such distances can allow for others outside of your immediate area to access your network. Unlike wired network data, your wireless data transmissions can be received well beyond your walls by anyone with a compatible adapter. For this reason, use the security features of your wireless equipment. The Wireless Range Extender provides highly effective security features that are covered in detail in this chapter. Deploy the security features appropriate to your needs. Wireless Data Security Options There are several ways you can enhance the security of your wireless network. • Restrict Access Based on MAC address. You can restrict access to only trusted computers so that unknown computers cannot wirelessly connect to the WGX102. MAC address filtering adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed. • Turn Off the Broadcast of the Wireless Network Name SSID. If you disable broadcast of the SSID, only devices that have the correct SSID can connect. This nullifies the wireless network "discovery" feature of some products such as Windows XP, but the data is still fully exposed to a determined snoop using specialized test equipment like wireless sniffers. • WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared Key authentication and WEP data encryption will block all but the most determined eavesdropper. • WPA-PSK. Wi-Fi Protected Access (WPA) data encryption provides strong data security. WPA-PSK will block eavesdropping. Because this is a new standard, wireless device driver and software availability may be limited. Understanding Basic Wireless Settings To configure the Wireless settings of your wireless range extender, click the Wireless link in the main menu of the browser interface. The Wireless Settings menu appears, as shown below. 5-2 Wireless Configuration and Security 202-10042-02 v1.1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169

Reference Manual for the 54 Mbps Wall-Plugged Wireless Range Extender WGX102
5-2
Wireless Configuration and Security
202-10042-02 v1.1
Implementing Appropriate Wireless Security
Unlike wired network data, your wireless data transmissions can be received well beyond your
walls by anyone with a compatible adapter. For this reason, use the security features of your
wireless equipment. The Wireless Range Extender provides highly effective security features that
are covered in detail in this chapter. Deploy the security features appropriate to your needs.
Wireless Data Security Options
There are several ways you can enhance the security of your wireless network.
Restrict Access Based on MAC address.
You can restrict access to only trusted computers so
that unknown computers cannot wirelessly connect to the WGX102. MAC address filtering
adds an obstacle against unwanted access to your network, but the data broadcast over the
wireless link is fully exposed.
Turn Off the Broadcast of the Wireless Network Name SSID.
If you disable broadcast of
the SSID, only devices that have the correct SSID can connect. This nullifies the wireless
network “discovery” feature of some products such as Windows XP, but the data is still fully
exposed to a determined snoop using specialized test equipment like wireless sniffers.
WEP.
Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared
Key authentication and WEP data encryption will block all but the most determined
eavesdropper.
WPA-PSK.
Wi-Fi Protected Access (WPA) data encryption provides strong data security.
WPA-PSK will block eavesdropping. Because this is a new standard, wireless device driver
and software availability may be limited.
Understanding Basic Wireless Settings
To configure the Wireless settings of your wireless range extender, click the Wireless link in the
main menu of the browser interface. The Wireless Settings menu appears, as shown below.
Note:
Indoors, computers can connect over 802.11b/g wireless networks at ranges of up
to 300 feet. Such distances can allow for others outside of your immediate area to access
your network.