Netgear MBR1200 - HSPA+ Mobile Broadband Wireless Router User Manual

Page of 108
26
   
|   
Chapter 2:  Wireless Network Configuration  
Mobile Broadband 11n Wireless Router MBR1000 User Manual 
Wireless Security Options
Indoors, computers can connect over 802.11n wireless networks at a maximum range of up 
to 300 feet. Such distances can allow for others outside your immediate area to access your 
network.
Unlike wired network data, your wireless data transmissions can extend beyond your walls 
and can be received by anyone with a compatible adapter. For this reason, use the security 
features of your wireless equipment. The Mobile Broadband 11n Wireless Router provides 
highly effective security features, which are covered in detail in this chapter. Deploy the 
security features appropriate to your needs.
There are several ways you can enhance the security of your wireless network:
Figure 4. Wireless Security
•     
Restrict access based on MAC address
. You can allow only trusted PCs to connect so 
that unknown PCs cannot wirelessly connect to the router. Restricting access by MAC 
address adds an obstacle against unwanted access to your network, but the data 
broadcast over the wireless link is fully exposed. 
•     
Turn off the broadcast of the wireless network name (SSID)
. If you disable broadcast 
of the SSID, only devices that have the correct SSID can connect. This nullifies wireless 
network “discovery” feature of some products, such as Windows XP, but the data is still 
exposed.
•     
WEP.
 Wired Equivalent Privacy (WEP) data encryption provides data security. WEP 
Shared Key authentication and WEP data encryption block all but the most determined 
eavesdropper. This data encryption mode has been superseded by WPA-PSK and 
WPA2-PSK.
•     
WPA-PSK (TKIP), WPA2-PSK (AES)
. Wi-Fi Protected Access (WPA) using a pre-shared 
key to perform authentication and generate the initial data encryption keys. The very 
strong authentication along with dynamic per frame re-keying of WPA makes it virtually 
impossible to compromise. 
For more information about wireless technology, click the link to the online document