
Reference Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V
Implement Appropriate Wireless Security
Note: Indoors, computers can connect over 802.11b/g wireless networks at ranges of up to 300 feet. Such distances can allow for others outside of your immediate area to access your network.
Unlike wired network data, your wireless data transmissions can be received well beyond your walls by anyone with a compatible adapter. For this reason, use the security features of your wireless equipment. The WGR826V Wireless Router provides highly effective security features which are covered in detail in this chapter. Deploy the security features appropriate to your needs.
:LUHOHVV'DWD
6HFXULW\2SWLRQV
5DQJHXSWRIRRWUDGLXV
2SHQV\VWHPHDV\EXWQRVHFXULW\
0$&DFFHVVOLVWQRGDWDVHFXULW\
:(3VHFXULW\EXWVRPHSHUIRUPDQFHLPSDFW
:3$36.YHU\VWURQJVHFXULW\
Figure 5-1: WGR826V wireless data security options
There are several ways you can enhance the security of your wireless network.
•Turn Off the Broadcast of the Wireless Network Name SSID. If you disable broadcast of the SSID, only devices that have the correct SSID can connect. This nullifies the wireless network ‘discovery’ feature of some products such as Windows XP, but the data is still fully exposed to a determined snoop using specialized test equipment like wireless sniffers.
•WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared Key authentication and WEP data encryption will block all but the most determined eavesdropper.
•
Optimizing Wireless Connectivity and Security |