Reference Manual for the MR814 v3 Cable/DSL Wireless Router
4-2
Wireless Configuration
202-10039-01
Implement Appropriate Wireless Security
Unlike wired network data, your wireless data transmissions can be received well beyond your
walls by anyone with a compatible adapter. For this reason, use the security features of your
wireless equipment. The MR814 v3 router provides highly effective security features which are
covered in detail in this chapter. Deploy the security features appropriate to your needs.
Figure 4-1: MR814 v3 wireless data security options
There are several ways you can enhance the security of you wireless network.
•
Restrict Access Based on MAC Address.
You can restrict access to only trusted computers o
that unknown computers cannot wirelessly connect to the MR814 v3. MAC address filtering
adds an obstacle against unwanted access to your network, but the data broadcast over the
wireless link is fully exposed.
•
WEP.
Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared
Key authentication and WEP data encryption will block all but the most determined
eavesdropper.
•
WPA-PSK.
Wi-Fi Protected Access (WPA) data encryption provides strong data security.
WPA-PSK will block eavesdropping. Because this is a new standard, wireless device driver
and software availability may be limited.
Note:
Indoors, computers can connect over 802.11 wireless networks at ranges
of up to 300 feet.
Such distances can allow for others outside of your immediate area to
access your network.
:LUHOHVV'DWD
6HFXULW\2SWLRQV
5DQJHXSWRIRRWUDGLXV
2SHQV\VWHPHDV\EXWQRVHFXULW\
0$&DFFHVVOLVWQRGDWDVHFXULW\
:(3VHFXULW\EXWVRPHSHUIRUPDQFHLPSDFW
:3$36.YHU\VWURQJVHFXULW\
MR814 v3