Netgear WNR1000 WNR1000 User Manual - Page 27

Safeguarding Your Network, Choosing Appropriate Wireless Security - network key

Page 27 highlights

Chapter 2 Safeguarding Your Network The N150 Wireless Router WNR1000 provides highly effective security features, which are covered in detail in this chapter. This chapter includes the following sections: • "Choosing Appropriate Wireless Security" • "Recording Basic Wireless Settings Setup Information" on page 2-5 • "Changing Wireless Security Settings" on page 2-6 • "Viewing Advanced Wireless Settings" on page 2-11 • "Using Push 'N' Connect (Wi-Fi Protected Setup)" on page 2-12 • "Restricting Wireless Access by MAC Address" on page 2-18 • "Changing the Administrator Password" on page 2-20 • "Backing Up Your Configuration" on page 2-21 • "Understanding Your Firewall" on page 2-21 Choosing Appropriate Wireless Security Unlike wired networks, wireless networks allow anyone with a compatible adapter to receive your wireless data transmissions well beyond your walls. Operating an unsecured wireless network creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network to access your computers and files. Indoors, computers can connect over wireless networks at ranges of up to 300 feet. Such distances can allow for others outside your immediate area to access your network. Use the security features of your wireless equipment that are appropriate to your needs. The time it takes to establish a wireless connection can vary depending on both your security settings and router placement. Stronger security methods can entail a cost in terms of throughput, latency, battery consumption, and equipment compatibility. In choosing an appropriate security level, you can also consider the effort compared to the reward for a hacker to break into your network. As a minimum, however, NETGEAR recommends using WEP with Shared Key authentication. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public. 2-1 v1.0, January 2009

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122

2-1
v1.0, January 2009
Chapter 2
Safeguarding Your Network
The N150 Wireless Router WNR1000
provides highly effective security features, which are
covered in detail in this chapter.
This chapter includes the following sections:
“Choosing Appropriate Wireless Security
“Recording Basic Wireless Settings Setup Information” on page 2-5
“Changing Wireless Security Settings” on page 2-6
“Viewing Advanced Wireless Settings” on page 2-11
“Using Push 'N' Connect (Wi-Fi Protected Setup)” on page 2-12
“Restricting Wireless Access by MAC Address” on page 2-18
“Changing the Administrator Password” on page 2-20
“Backing Up Your Configuration” on page 2-21
“Understanding Your Firewall” on page 2-21
Choosing Appropriate Wireless Security
Unlike wired networks, wireless networks allow anyone with a compatible adapter to receive your
wireless data transmissions well beyond your walls. Operating an unsecured wireless network
creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network
to access your computers and files. Indoors, computers can connect over wireless networks at
ranges of up to 300 feet. Such distances can allow for others outside your immediate area to access
your network. Use the security features of your wireless equipment that are appropriate to your
needs.
The time it takes to establish a wireless connection can vary depending on both your security
settings and router placement.
Stronger security methods can entail a cost in terms of throughput, latency, battery consumption,
and equipment compatibility. In choosing an appropriate security level, you can also consider the
effort compared to the reward for a hacker to break into your network. As a minimum, however,
NETGEAR recommends using WEP with Shared Key authentication. Do not run an unsecured
wireless network unless it is your intention to provide free Internet access for the public.