MaxR-3210 Wireless-N Access Point User Manual
Arada Systems Confidential
3
v1.1, Dec 2009
If you are using multiple access points for 11b/bg/ng, it is better if adjacent access points use
different radio frequency
channels to reduce interference. The recommended Channel spacing
between adjacent access points is 5 Channels (for example, use Channels 1 and 6, or 6 and 11).
The time it takes to establish a wireless connection can vary depending on both your security
settings and placement. Some types of security connections can take slightly longer to establish
and can consume more battery power on a notebook computer.
Understanding MaxR-3210 Wireless Security Options
Your wireless data transmissions can be received well beyond your walls by anyone with a
compatible adapter. For this reason, use the security features of your wireless equipment. The
MaxR-3210 Wireless Access Point provides highly effective security features which are covered
in detail in this chapter. Deploy the security features appropriate to your needs.
There are several ways you can enhance the security of your wireless network:
•
Restrict Access Based on MAC address.
You can restrict access to only trusted PCs so that
unknown PCs cannot wirelessly connect to the MaxR-3210. MAC address filtering adds an
obstacle against unwanted access to your network, but the data broadcast over the wireless link
is fully exposed.
•
Turn Off the Broadcast of the Wireless Network Name (SSID).
If you disable broadcast of
the SSID, only devices that have the correct SSID can connect. This nullifies the wireless
network “discovery” feature of some products such as Windows XP, Vista and Unix systems
but the data is still fully exposed to a determined snoop using specialized test equipment like
wireless sniffers.
•
Use WEP.
Wired Equivalent Privacy (WEP) data encryption provides data security. WEP
open authentication and WEP data encryption will block all but the most determined
eavesdropper.
•
Use WPA or WPA-PSK.
Wi-Fi Protected Access (WPA) data encryption provides data
security. The very strong authentication along with dynamic per frame rekeying of WPA make
it virtually impossible to compromise. Because this is a new standard, wireless device driver
and software availability may be limited.
Note:
WEP and TKIP provide only legacy rates of operation. So, AES is the
recommended solution to use the 802.11n rates and speed.