Reference Manual for the ADSL Modem Wireless Router DG834GSP
4-2 Wireless Configuration
v1.0, June 2007
The time it takes to establish a wireless connection can vary depending on both your security
settings and placement. WEP connections can take slightly longer to establish. Also, WEP
encryption can consume more battery power on a notebook computer.
Implement Appropriate Wireless Security
Unlike wired network data, your wireless data transmissions can extend beyond your walls and
can be received by anyone with a compatible adapter. For this reason, use the security features of
your wireless equipment. The ADSL Modem Wireless Router provides highly effective security
features which are covered in detail in this chapter. Deploy the security features appropriate to
your needs.
There are several ways you can enhance the security of your wireless network:
• Restrict Access Based on MAC Address. You can allow only trusted PCs to connect so that
unknown PCs cannot wirelessly connect to the DG834GSP. Restricting access by MAC
address adds an obstacle against unwanted access to your network, but the data broadcast over
the wireless link is fully exposed.
• Turn Off the Broadcast of the Wireless Network Name SSID. If you disable broadcast of
the SSID, only devices that have the correct SSID can connect. This nullifies wireless network
‘discovery’ feature of some products, such as Windows XP, but the data is still exposed.
Note: Indoors, computers can connect over 802.11g wireless networks at a maximum
range of up to 300 feet. Such distances can allow for others outside of your
immediate area to access your network.
Figure 4-1
/PEN3YSTEM%ASYBUTNOSECURITY
-!#!CCESS,IST.ODATASECURITY
7%03ECURITYBUTSOMEPERFORMANCEIMPACT
70!3TRONGSECURITY
:LUHOHVV'DWD
6HFXULW\2SWLRQV
5DQJH8SWR)HHW