N150 Wireless Router User Manual
Table 2. Other Features That Enhance Security
Security Type | Description |
|
|
Restrict access based on MAC address. | You can restrict access to only trusted computers so |
| that unknown computers cannot wirelessly connect |
| to the WNR1000v3h2 router. MAC address filtering |
| adds an obstacle against unwanted access to your |
| network by the general public, but the data broadcast |
| over the wireless link is fully exposed. This data |
| includes your trusted MAC addresses, which can be |
| read and impersonated by a hacker. |
| For more information, see Restricting Wireless |
| Access by MAC Address on page 35. |
|
|
Modify your firewall’s rules. | By default, the firewall allows any outbound traffic |
| and prohibits any inbound traffic except for |
| responses to your outbound traffic. However, you |
| can modify the firewall’s rules. |
| For more information, see Understanding Your |
| Firewall on page 40. |
Use the Push 'N' Connect feature | |
Setup). | means of a push button. Older wireless adapters and |
| devices might not support this. Check whether |
| devices are WPS enabled. |
| For more information, see Using Push 'N' Connect |
| |
|
|
Recording Basic Wireless Settings Setup Information
Before and after customizing your wireless settings, print this section, and record the following information. If you are working with an existing wireless network, the person who set up or is responsible for the network can provide this information. Otherwise, you must choose the settings for your wireless network. Either way, record the settings for your wireless network in the spaces provided.
•Wireless Network Name (SSID). ______________________________ The SSID identifies the wireless network. You can use up to 32 alphanumeric characters. The SSID is
•If WEP Authentication is used, circle one: Shared Key or Auto.
Note: If you select Shared Key, the other devices in the network will not connect unless they are also set to Shared Key and are configured with the correct key.