WNHDE111 5GHz Wireless-N HD Access Point/Bridge User Manual
Securing My Wireless
4-3
v1.1, May 2008
Basic security options are listed in order of increasing effectiveness below. For more details on
wireless security methods,
“Wireless Networking Basics” in Appendix B
.
Table 4-1.
Wireless Security Options
Security Type
Description
None
.
No wireless security. Recommended only for troubleshooting wireless
connectivity. Do not run an unsecured wireless network unless it is your
intention to provide free Internet access for the public.
WEP
. Wired Equivalent Privacy.
For more information, see
“Con-
figuring WEP Wireless Security”
on page 4-5
.
Wired Equivalent Privacy (WEP) data encryption provides moderate
data security. WEP Shared Key authentication and WEP data encryption
can be defeated by a determined eavesdropper using publicly available
tools.
WPA-PSK (TKIP)
.
WPA2-PSK (AES)
.
WPA-PSK (TKIP) + WPA2-PSK
(AES)
. Mixed mode.
For more information, see
“Con-
figuring WPA Wireless Security”
on page 4-6
.
Wi-Fi Protected Access with Pre-Shared Key (WPA-PSK and WPA2-
PSK) data encryption provides extremely strong data security, very
effectively blocking eavesdropping. Because WPA and WPA2 are
relatively new standards, older wireless adapters and devices might not
support them.
Table 4-2.
Other Features That Enhance Security
Security Type
Description
Turn off the broadcast of the
wireless network name SSID.
For more information, see
“View-
ing Advanced Wireless Settings”
on page 4-6
.
If you disable the broadcast of the SSID, only devices that know the
correct SSID can connect. This nullifies the wireless network discovery
feature of some products such as Windows XP, but your data is still fully
exposed to an intruder using available wireless eavesdropping tools.
Restrict access based on MAC
address.
For more information,
see
“Restricting Wireless Access
by MAC Address” on page 4-11
.
You can restrict access to only trusted computers so that unknown
computers cannot wirelessly connect to the Wireless-N AccessPoint/
Bridge. MAC address filtering adds an obstacle against unwanted access
to your network by the general public, but the data broadcast over the
wireless link is fully exposed. This data includes your trusted MAC
addresses, which can be read and impersonated by a hacker.
Use the Push 'N' Connect
feature (Wi-Fi Protected
Setup).
For more information,
see
“Using Push 'N' Connect
(Wi-Fi Protected Setup)” on
page 4-7
.
Wi-Fi Protected Setup provides easy setup by means of a push button.
Older wireless adapters and devices might not support this. Check
whether devices are WPS enabled.