Netgear WGR614 v5 Manual Do Utilizador

Página de 172
Reference Manual for the 54 Mbps Wireless Router WGR614 v5
4-2
Wireless Configuration
June 2004 202-10036-01
Implement Appropriate Wireless Security 
Unlike wired network data, your wireless data transmissions can be received well beyond your 
walls by anyone with a compatible adapter. For this reason, use the security features of your 
wireless equipment. The WGR614 v5 router provides highly effective security features which are 
covered in detail in this chapter. Deploy the security features appropriate to your needs.
Figure 4-1:  WGR614 v5 wireless data security options
There are several ways you can enhance the security of your wireless network.
Restrict Access Based on MAC address. You can restrict access to only trusted computers so 
that unknown computers cannot wirelessly connect to the WGR614 v5. MAC address filtering 
adds an obstacle against unwanted access to your network, but the data broadcast over the 
wireless link is fully exposed. 
Turn Off the Broadcast of the Wireless Network Name SSID. If you disable broadcast of 
the SSID, only devices that have the correct SSID can connect. This nullifies the wireless 
network ‘discovery’ feature of some products such as Windows XP, but the data is still fully 
exposed to a determined snoop using specialized test equipment like wireless sniffers.
WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared 
Key authentication and WEP data encryption will block all but the most determined 
eavesdropper. 
Note: 
Indoors, computers can connect over 802.11b/g wireless networks at ranges of up 
to 300 feet. Such distances can allow for others outside of your immediate area to access 
your network.
:LUHOHVV'DWD
6HFXULW\2SWLRQV
5DQJHXSWRIRRWUDGLXV
2SHQV\VWHPHDV\EXWQRVHFXULW\
0$&DFFHVVOLVWQRGDWDVHFXULW\
:(3VHFXULW\EXWVRPHSHUIRUPDQFHLPSDFW
:3$36.YHU\VWURQJVHFXULW\
WGR614 v5