
2-1
v1.0, April 2008
Chapter 2
Implementing Appropriate Wireless Security
Unlike wired network data, your wireless data transmissions can be received well beyond your
walls by anyone with a compatible adapter. For this reason, use the security features of your
wireless equipment. The WiFi range extender provides highly effective security features, which
are covered in detail in this chapter.
Enhancing the Security of Your Network
Deploy the security features appropriate to your needs.
There are several ways you can enhance the secur ity of your wireless network.
• Restrict access based on MAC address. You can restrict access to only trusted computers so
that unknown computers cannot wirelessly connect to the WPN824EXT. MAC address
filtering adds an obstacle against unwanted access to your network, but the data broadcast over
the wireless link is fully exposed.
Figure 2-1
Note: Indoors, computers can connect over 802.11b/g wireless networks at ranges of up
to 300 feet. Such distances can allow for others outside of your immediate area to
access your network.
Wireless Data
Security Options
Range: Up to 300 foot radius
1. Open. Easy but no security
2. MAC Access List. No data security
3. WEP. Security but vulnerable
4. WPA or WPA-PSK. Very strong security