Netgear WN203 User Manual - Page 32

WPA and WPA-PSK TKIP, Legacy 802.1X

Page 32 highlights

ProSAFE Single Band 802.11n Wireless Access Point WN203 There are many ways in which you can enhance the security of your wireless network: • Use multiple BSSIDs combined with VLANs. You can configure combinations of VLANS and BSSIDs (security profiles) with stronger or less restrictive access security according to your requirements. For example, visitors could be given wireless Internet access but be excluded from any access to your internal network. For information about how to configure BSSIDs, see Configure and Enable Security Profiles on page 36. • Restrict access based by MAC address. You can allow only trusted devices to connect so that unknown devices cannot wirelessly connect to the wireless access point. Restricting access by MAC address adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed. For information about how to restrict access by MAC address, see Restrict Wireless Access by MAC Address on page 46. • Turn off the broadcast of the wireless network name (SSID). If you disable broadcast of the SSID, only devices that have the correct SSID can connect. This nullifies the wireless network discovery feature of some products, such as Windows XP, but the data is still exposed. For information about how to turn off broadcast of the SSID, see Configure and Enable Security Profiles on page 36. • WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP shared key authentication and WEP data encryption block all but the most determined eavesdropper. This data encryption mode has been superseded by WPA-PSK and WPA2-PSK. For information about how to configure WEP, see the following sections: - Configure and Enable Security Profiles on page 36 - Configure an Open System with WEP or Shared Key with WEP on page 40 • Legacy 802.1X. Legacy 802.1X uses RADIUS-based 802.1x authentication but no data encryption. For information about how to configure Legacy 802.1X, see the following sections: - Configure and Enable Security Profiles on page 36 - Configure Legacy 802.1X on page 42 • WPA and WPA-PSK (TKIP). Wi-Fi Protected Access (WPA) data encryption provides strong data security with Temporal Key Integrity Protocol (TKIP) encryption. The very strong authentication along with dynamic per-frame rekeying of WPA makes it virtually impossible to compromise. WPA uses RADIUS-based 802.1x authentication; for more information, see the following sections: - Configure and Enable Security Profiles on page 36 - Configure WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS on page 42 Wireless Configuration and Security 32

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133

Wireless Configuration and Security
32
ProSAFE Single Band 802.11n Wireless Access Point WN203
There are many ways in which you can enhance the security of your wireless network:
Use multiple BSSIDs combined with VLANs
. You can configure combinations of
VLANS and BSSIDs (security profiles) with stronger or less restrictive access security
according to your requirements. For example, visitors could be given wireless Internet
access but be excluded from any access to your internal network.
For information about how to configure BSSIDs, see
Configure and Enable Security
Profiles
on page
36.
Restrict access based by MAC address
. You can allow only trusted devices to connect
so that unknown devices cannot wirelessly connect to the wireless access point.
Restricting access by MAC address adds an obstacle against unwanted access to your
network, but the data broadcast over the wireless link is fully exposed.
For information about how to restrict access by MAC address, see
Restrict Wireless
Access by MAC Address
on page
46.
Turn off the broadcast of the wireless network name (SSID)
. If you disable broadcast
of the SSID, only devices that have the correct SSID can connect. This nullifies the
wireless network discovery feature of some products, such as Windows XP, but the data
is still exposed.
For information about how to turn off broadcast of the SSID, see
Configure and Enable
Security Profiles
on page
36.
WEP
. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP
shared key authentication and WEP data encryption block all but the most determined
eavesdropper. This data encryption mode has been superseded by WPA-PSK and
WPA2-PSK.
For information about how to configure WEP, see the following sections:
-
Configure and Enable Security Profiles
on page
36
-
Configure an Open System with WEP or Shared Key with WEP
on page
40
Legacy 802.1X
. Legacy 802.1X uses RADIUS-based 802.1x authentication but no data
encryption.
For information about how to configure Legacy 802.1X, see the following sections:
-
Configure and Enable Security Profiles
on page
36
-
Configure Legacy 802.1X
on page
42
WPA and WPA-PSK (TKIP)
. Wi-Fi Protected Access (WPA) data encryption provides
strong data security with Temporal Key Integrity Protocol (TKIP) encryption. The very
strong authentication along with dynamic per-frame rekeying of WPA makes it virtually
impossible to compromise.
WPA uses RADIUS-based 802.1x authentication; for more information, see the following
sections:
-
Configure and Enable Security Profiles
on page
36
-
Configure WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS
on page
42