|
Dieses Gerät hat auch andere Anweisungen:
Anleitung Zusammenfassung
Deploy the security features appropriate to your needs. Figure 3-1: WGR614 wireless data security options There are several ways you can enhance the security of you wireless network. •Restrict Access Based on MAC address. You can restrict access to only trusted PCs o that unknown PCs cannot wirelessly connect to the WGR614. MAC address filtering adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed. •Turn Off the Broadcast of the Wireless Network Name SSID. If you disable broadcast of the SSID, only devices that have the correct SSID can connect. This nullifies the wireless network ‘discovery’ feature of some products such as Windows XP, but the data is still fully exposed to a determined snoop using specialized test equipment like wireless sniffers. •WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared Key authentication and WEP data encryption will block all but the most determined eavesdropper. •Turn Off the Wired LAN. If you disable the wireless LAN, wireless devices cannot communicate with the router at all. You might choose to turn off the wireless the LAN when you are away and the others in the household all use wired connections. Understanding Wireless Settings To configure the Wireless settings of your firewall, click the Wireless link in the main menu of the browser interface. The Wireless Settings menu will appear, as shown below. Figure 3-2: Wireless Settings menu The 802.11b and 802.11g wireless networking protocols are configured in exactly the same fashion. •Name (SSID). The SSID is also known as the wireless network name. Enter a value of up to 32 alphanumeric characters. In a setting where there is more than one wireless network, different wireless network names provide a means for separating the traffic. Any device you want to participate in a particular wireless network will need to use this SSID for that network. The WGR614 default SSID is: NETGEAR. •Region. This field identifies the region where the WGR614 can be used. It may not be legal to operate the wireless features of the router in a region other than one of those identified in this field. •Channel. This field determines which operating frequency will be used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby access point. For more information on the wireless channel frequencies please refer to “Wireless Channels” on page D-7. •Mode. This field determines which data communications protocol will be used. You can select “g only” or “g and b.” “g only” dedicates the WGR614 to communicating with the higher bandwidth 802.11g wireless devices exclusively. The “g and b” mode provides backward compatibility with the slower 802.11b wireless devices while still enabling 802.11g communications. •Allow Broadcast of Name (SSID). If you disable broadcast of the SSID, only devices that have the correct SSID can connect. Disabling SSID broadcast nullifies the wireless network ‘discovery’ feature of some products such as Windows XP. •Enable Wireless Access Point. If you disable the wireless access point, wireless devices cannot connect to the WGR614. •Wireless Card Access List. When the Trusted PCs Only radio button is selected, the WGR614 checks the MAC address of the wireless station and only allows connections to PCs identified on the trusted PCs list. Understanding WEP Authentication and Encryption Restricting wireless access to your network prevents intruders from connecting to your network. However, the wireless data transmissions are still vulnerable to snooping. Using the WEB data encryption settings described below will prevent a determined intruder from eavesdropping on your wireless data communications. Also, if you are using the Internet for such activities as purchases or banking, those Internet sites use another level of highly secure encryption called SSL. You can tell if a web site is using SSL because the web address begins with HTTPS rather than HTTP. Authentication Scheme Selection Figure 3-3: Encryption Strength The WGR614 lets you select the following wireless authentication schemes. •Automatic. •Open System. •Shared key. Be sure to set your wireless adapter according to the authentication scheme you choose for the WGR614 router. Please refer to “Authentication and WEP” on page D-3 for a full explanation of each of these options, as defined by the IEEE 802.11 wireless communication standard. Encryption Strength Choices Choose the encryption strength from the drop-down list. Please refer to “Overview of WEP Parameters” on page D-5 for a full explanation of each of these options, as defined by the IEEE 802.11 wireless communication standard. •Disable. No encryption will be applied. This setting is useful for troubleshooting your wireless connection, but leaves your wireless data fully exposed. •64-bit or 128-bit WEP. When 64-bit or 128-bit is selected, WEP encryp...
Dieses Handbuch ist für folgende Modelle:Netzwerk - WGR614v2 (2.38 mb)
Netzwerk - WGR614v3 (2.38 mb)