NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
fstarne
Dec 31, 2015Aspirant
R7000 New Firmware 1.0.6.28 released
New Features: Supports Arlo camera. Set up the R7000 as an Arlo base station and connect an Arlo camera to the R7000 without needing an extra base station.. Bug Fixes: Fixes the issue in which ...
- May 25, 2016
If you are going backwards in release number you might still have them (that is from one of the older recalled beta's). However there is NO guarantee they will work. In cases like that you have to RESET the router and then re-apply manually your setting for proper operation.
If you are moving up from and older official release, like V1.0.4 or older you don't need to reset the router but it is advised. In this case I'd give it a try, have any problems, reset and re-enter is the first thing to try. DO NOT load saved settings from any other version into a new one. That seems to be asking for trouble these days.
Hot54321
Jan 06, 2016Apprentice
Killhippie
If i get the option to hide the ssid, that must to be worked in the firmware. Otherwise isn't build in.
If i get the option to hide the ssid, that must to be worked in the firmware. Otherwise isn't build in.
Killhippie
Jan 07, 2016Prodigy
Yes but it doesnt make it a good idea just because its there to fiddle with it, 20/40 Coexistance is there but it should really be left to 20 unless you live in a field in the middle of nowhere, otherwise you can mess up not only your neighbours but your own network. Leave the SSID visable and use a good strong WPA2 AES password, thats all the security you really need, same as mac filtering, so easy to spoof its not worth turning on and in some cases causes issues with some clients.
- mondenathJan 07, 2016Prodigy
I dont agree mac filtering cant be spoofed. Hacking is always there but if mac filtered it hard to get in not like impossible. Unless no one takes so hard to get in simple wifi nw unless a huge worth behind it.
Nighthawk cant just be simply hacked with some simple client . You need to genius in nw to do that finding the loophole and bruteforce with advanced technique.
- chopin70Jan 07, 2016Virtuoso
LoL, MAC filtering doesn't need a hacker, just a teenager, but a bit smart to just do a google for the needed tools ;-)
- TheEtherJan 07, 2016Guru
Killhippie wrote:Yes but it doesnt make it a good idea just because its there to fiddle with it, 20/40 Coexistance is there but it should really be left to 20 unless you live in a field in the middle of nowhere, otherwise you can mess up not only your neighbours but your own network. Leave the SSID visable and use a good strong WPA2 AES password, thats all the security you really need, same as mac filtering, so easy to spoof its not worth turning on and in some cases causes issues with some clients.
+1
Just to be clear, 20/40 Coexistence should be left enabled. This is the default setting and is what allows the router to drop back down to 20 MHz in order to play nicely with nearby Wi-Fi networks.
I also agree about MAC filtering being useless protection against hackers. On Netgear routers, MAC filtering is enforced after Wi-Fi security is checked. If a hacker can crack your Wi-Fi password, he'll have no problem getting past MAC filtering. Cracking a Wi-Fi password is still moderately difficult but there are tools (Google hashcat) that can leverage the powerful GPUs in high-end videos to crack an 8 character Wi-Fi password in less than a day (Hint: Make your Wi-Fi password at least 12 characters!). Contrast that with, literally, the 5 minutes it will take to bypass MAC filtering. It's like putting a Master combination lock on the door inside a bank vault.
MAC filtering can still be used as an administrative tool to limit Internet access for kids. Hopefully, they don't have the technical know how to find articles like this one (link) to bypass it. Or, worse they have smartphones and simply switch to cellular data.