User Manual
Table Of Contents
- NETGEAR WNAP210 ProSafe Wireless-N Access Point Reference Manual
- About This Manual
- Chapter 1 Introduction
- Chapter 2 Installation and Configuration
- Chapter 3 Wireless Security Settings
- Chapter 4 Management
- Chapter 5 Advanced Wireless Bridging
- Chapter 6 Troubleshooting
- No lights are lit on the access point.
- The Ethernet light is not lit.
- The WLAN light is not lit.
- I cannot configure the access point from a browser.
- I cannot access the Internet or the LAN with a wireless capable computer.
- When I enter a URL or IP address I get a timeout error.
- Using the Reset Button to Restore Factory Default Settings
- Appendix A Default Settings and Technical Specifications
- Appendix B Related Documents
3-1
v1.0, February 2009
Chapter 3
Wireless Security Settings
Your wireless data transmissions can be received well beyond your walls by anyone with a
compatible adapter. For this reason, use the security features of your wireless equipment. The
ProSafe Access Point provides highly effective security features which are covered in detail in this
chapter. Deploy the security features appropriate to your needs.
.O3ECURITY%ASYBUTNOSECURITY
-!#!CCESS,IST.ODATASECURITY
7%03ECURITYBUTVULNERABLE
70!03+70!03+OR70!03+
70!03+6ERYSTRONGSECURITY
Wireless Data
Security Options
Range: Up to 500 Foot Radius
WNAP210
Figure 3-1
Understanding WNAP210 Wireless Security Options
There are several ways you can enhance the security of your wireless network:
• Res
trict Access Based on MAC address. You can restrict access to only trusted PCs so that
unknown PCs cannot wirelessly connect to the WNAP210. MAC address filtering adds an
obstacle against unwanted access to your network, but the data broadcast over the wireless link
is fully exposed.
• T
urn Off the Broadcast of the Wireless Network Name (SSID). If you disable broadcast of
the SSID, only devices that have the correct SSID can connect. This nullifies the wireless
network “discovery” feature of some products such as Windows XP, but the data is still fully
exposed to a determined snoop using specialized test equipment like wireless sniffers.
• Use
WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP
Shared Key authentication and WEP data encryption will block all but the most determined
eavesdropper.










