Chapter 2
Safeguarding Your Network
The
This chapter includes the following sections:
•“Choosing Appropriate Wireless Security”
•“Recording Basic Wireless Settings Setup Information” on page
•“Changing Wireless Security Settings” on page
•“Viewing Advanced Wireless Settings” on page
•“Restricting Wireless Access by MAC Address” on page
•“Restricting Wireless Access by MAC Address” on page
•“Adding Guest Networks” on page
•“Changing the Administrator Password” on page
•“Backing Up Your Configuration” on page
•“Understanding Your Firewall” on page
Choosing Appropriate Wireless Security
Unlike wired networks, wireless networks allow anyone with a compatible adapter to receive your wireless data transmissions well beyond your walls. Operating an unsecured wireless network creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network to access your computers and files. Indoors, computers can connect over 802.11b/g wireless networks at ranges of up to 300 feet. Such distances can allow for others outside your immediate area to access your network. Use the security features of your wireless equipment that are appropriate to your needs.
The time it takes to establish a wireless connection can vary depending on both your security settings and router placement.