NETGEAR WNR1000v3h2 manual Choosing Appropriate Wireless Security

Page 20

N150 Wireless Router User Manual

Choosing Appropriate Wireless Security

Unlike wired networks, wireless networks allow anyone with a compatible adapter to receive your wireless data transmissions well beyond your walls. Operating an unsecured wireless network creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network to access your computers and files. Indoors, computers can connect over wireless networks at ranges of up to 300 feet. Such distances can allow for others outside your immediate area to access your network. Use the security features of your wireless equipment that are appropriate to your needs.

The time it takes to establish a wireless connection can vary depending on both your security settings and router placement.

Stronger security methods can entail a cost in terms of throughput, latency, battery consumption, and equipment compatibility. In choosing an appropriate security level, you can also consider the effort compared to the reward for a hacker to break into your network. As a minimum, however, NETGEAR recommends using WEP with Shared Key authentication. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public.

WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK encryption can consume more battery power on a notebook computer, and can cause significant performance degradation with a slow computer.

Note: NETGEAR recommends that you change the administration password of your router. Default passwords are well known, and an intruder can use your administrator access to read or disable your security settings. For information about how to change the

administrator password, see Changing the Administrator Password

on page 38.

20 Chapter 2: Safeguarding Your Network

Image 20
Contents N150 Wireless Router WNR1000v3h2 Technical Support TrademarksStatement of Conditions Revision HistoryTable of Contents Customizing Your Network Settings Troubleshooting Using the Setup Manual Configuring Basic ConnectivityLogging In To Your Wireless Router Configuring Basic Connectivity Selecting a Language for Your Screen Display Configuring Basic Connectivity Your Internet Connection Does Not Require a Login Configuring Your Internet Settings Using the Setup WizardViewing and Configuring Basic Internet Settings No login required Your Internet Connection Does Require a Login Login required Configuring Basic Connectivity Setting Up and Testing Basic Wireless Connectivity Configuring Basic Connectivity Click Setup Access List Safeguarding Your Network Safeguarding Your NetworkChoosing Appropriate Wireless Security To configure the wireless network, you can Wireless Security Options Other Features That Enhance SecurityRecording Basic Wireless Settings Setup Information If WEP Authentication is used, circle one Shared Key or AutoChanging Wireless Security Settings Viewing Basic Wireless SettingsSafeguarding Your Network Configuring WEP Wireless Security Safeguarding Your Network Configuring WPA-PSK and WPA2-PSK Wireless Security Viewing Advanced Wireless Settings Using Push N Connect Wi-Fi Protected Setup Push Button Configuration Using the Physical Push ButtonUsing the Router’s Security PIN Security PIN EntryConfiguring the WPS Settings Using the Wireless Client’s Security PINAdding Additional WPS-Enabled Clients Restricting Wireless Access by MAC Address Adding Additional Non-WPS-Enabled ClientsSelect the Turn Access Control On check box Adding Guest Networks To add a guest network, do the followingChanging the Administrator Password Backing Up Your Configuration Understanding Your Firewall Restricting Access From Your Network Content Filtering OverviewBlocking Access to Internet Sites Blocking Access to Internet Services To block access to Internet services Blocking Services by IP Address Range Scheduling BlockingViewing Logs of Web Access or Attempted Web Access Log Entry DescriptionsConfiguring E-mail Alert and Web Access Log Notifications Setting the Time Zone Using the LAN IP Setup Options Customizing Your Network SettingsConfiguring a Device Name Configuring LAN TCP/IP Setup ParametersUsing the Router as a Dhcp Server Using Address ReservationUsing a Dynamic DNS Service To reserve an IP addressTo edit or delete a reserved address entry Click Edit or DeleteSelect the Use a Dynamic DNS Service check box Configuring the WAN Setup OptionsTo configure for a Dynamic DNS service Setting Up a Default DMZ Server Disabling Port Scan and DoS ProtectionConfiguring Static Routes Setting the MTU SizeConfiguring NAT Filtering Responding to a Ping on the Internet WAN PortTo add or edit a static route Customizing Your Network Settings Fine-Tuning Your Network Allowing Inbound Connections to Your NetworkFine-Tuning Your Network How Port Triggering Changes the Communication Process Web server then sends this reply message to your routerHow Port Forwarding Changes the Communication Process Configuring Port Forwarding to Local Servers How Port Forwarding Differs from Port TriggeringAdding a Custom Service To configure port forwarding to a local serverClick Edit Service or Delete Service to make changes Editing or Deleting a Port Forwarding EntryApplication Example Making a Local Web Server Public To edit or delete a port forwarding entryConfiguring Port Triggering Clear the Disable Port Triggering check box Using Universal Plug and Play To turn on Universal Plug and PlayOptimizing Wireless Performance Reduce interference Identify critical wireless linksChoose your settings Using WMM QoS for Wireless Multimedia Applications Using WMM for Wireless Multimedia ApplicationsQuality of Service To create a QoS policy for applications and online games Configuring QoS for Internet AccessQoS for Applications and Online Gaming Click Setup QoS Rule and then click Add Priority Rule QoS for a Router LAN PortQoS for a MAC Address Editing or Deleting an Existing QoS Policy Click Setup QoS RuleChanging the MTU Size Overview of Home and Small Office Networking Technologies Common MTU SizesAssessing Your Speed Requirements Theoretical Transfer Time for 1 Gigabyte Network Connection Theoretical Raw Transfer TimeUsing Network Monitoring Tools Using Network Monitoring ToolsViewing Wireless Router Status Information Wireless Router Status FieldsDhcp Click Connection Status to display the connection status Connection Status Settings Router StatisticsViewing a List of Attached Devices Rx B/sDo not interrupt the reboot process Managing the Configuration FileBacking Up and Restoring the Configuration Updating the Router Firmware Erasing the ConfigurationChecking for New Firmware in the Router Upgrade Screen Using Network Monitoring Tools Updating Manually to New Router Firmware Select the Turn Remote Management On check box Enabling Remote Management AccessTo configure your router for remote management Using Network Monitoring Tools Traffic Meter To monitor traffic on your router, do the followingUsing Network Monitoring Tools Be sure to restart your network in this sequence TroubleshootingQuick Tips Check the Test light to verify correct router operation Troubleshooting Basic FunctionsMake sure that the Ethernet cables are securely plugged Power light is not on Power light blinks green slowly and continuouslyPower light stays amber Internet light stays amberLogin Problems Internet or LAN port lights are not onChecking the Internet Service Connection Obtaining an Internet IP AddressTroubleshooting PPPoE Troubleshooting Internet BrowsingTroubleshooting Your Network Using the Ping Utility Testing the LAN Path to Your RouterTesting the Path from Your Computer to a Remote Device Request timed outProblems with Date and Time Problems with Wireless Adapter ConnectionsRestoring the Default Configuration and Password These procedures erase all current configuration settingsAppendix a Technical Specifications Default Configuration SettingsWNR1000v3h2 Router Default Configuration Settings Wireless Communication General Specifications WNR1000v3h2 Router General SpecificationsReference Documents Appendix B Related DocumentsRegulatory Compliance Information FCC Requirements for Operation in the United StatesEdoc in Languages of the European Community Europe EU Declaration of ConformityFCC Caution Pertinentes de la directive 1999/5/CE Interference Reduction Table Interference Reduction TableIndex IndexIndex PIN 32, 34 ping 54 Setup Manual