Well, out of the box is not going to do what you want.
However the WNDR3400v2 does support DMZ configuration. There's loads of netgear, web site and youtube resources to help you do this.
But you must worry about other things. Are you sure letting a child play some of these (mostly violent) video games is a sensible introduction to becoming an adult?
DMZ = "De-Militarized Zone" it is the name given to a port on your router that can be configured to be completely OPEN to the internet, no firewall, no port blocking, nothing. This may be advantageous for someone running a particular type of server on their home network - an FTP server or Web Server or something that they want to expose to the internet so that it can be accessed from the outside. In such configurations that device usually will have a software type firewall installed to prevent hackers from gaining access.
Most routers I have seen include this feature and it has is uses, but it must be used with extreme caution!
Okay, I understand that explanation. Now please tell me how my iPad or laptop broadcasting my home SSID willy nilly at the Starbucks or the passenger terminal at SFO or PHX is going to compromise my home network?
Not saying it couldn't be done but... Talk about freakin' remote...
I don't bother to hide my SSID at home. Anyone who cares to clone a MAC address to by-pass the MAC filter and decrypt a 26 alpha-numeric pass phrase can have it. Good luck with that
In short, yes. Your game console or computer or whatever needs to "talk" to another computer on the internet, in this case is uses Port
9000. The router opens Port 9000 and the packets get through to that other computer out there on the internet. To reply, that other computer only knows your static public IP, ie. "1.2.3.4" and sends its packets back to you at that IP on the same port, 9000. Your router receives these packets, and does NAT (Network address translation) translating the packets from 1.2.3.4:9000 (Your public IP) to 192.168.1.5:9000 your private home network IP and sending them there. This happens all time when you are accessing the web, either through HTTP, FTP, SSL, whatever. They all use their own specific ports, (ie HTTP is usually port 80, FTP 20 or 21, etc.)
There are several conflated issues. When it comes to security, it's hard to tease out a *single* issue/exploit without considering other vulnerabilities that may be related.
First, if your home SSID is "1313MockingbirdLane", you've now (likely) leaked some information about yourself. "Hmmm... *he's* here so the house is possibly unoccupied!"
Given how naive folks are about choosing their passwords, SSID's, etc. it's likely some idiot out there has an SSID of "3Jan1980" -- chosen to be something memorable! (his date of birth!)
Second, you are effectively advertising those networks to which you are
*willing* to connect! I can have a piece of software running on my laptop that sniffs your broadcasts and then decides to *impersonate* those networks -- especially if you "trust" any of them and don't have good/any credentials set up for them!
Cloning a MAC address is trivial. The software that snoops the WiFi can do that for you automatically! :>
I have no experience with DSL (I use cable internet), but I'd much rather have SEPARATE modem and router. The router is a part of MY network, and I want to be in control of it. One reason being I'm free to replace it (or just replace the firmware). No involving the ISP in my network. If they're combined, one failing would affect both. Also, the ISP could have back doors into your network.
If you do use a combination, at least be sure to CHANGE the password.
The transformer in one of those power adapters has a fuse in the primary. This is not a replaceable part, so the power adapter becomes useless after an overload. If the equipment doesn't come on at all, it's always a good idea to consider that.
Not much, but not none either. Consider that most people won't know there's a network there.
I've never had a combination, but agree that it would be less secure.
I had DOCSIS II until June, when my ISP increased the speed to 50Mbps which is too fast for a single channel so I had to get a new modem. I needed a new router too, but that (thankfully) was a completely separate thing.
Security is a thousand good practices, just like grammar is, or cleanliness or politeness or class. They're all a thousand little things.
SSID good practices are what we're talking about here.
There are a few problems with the scenario you proposed, but I have to manually *insert* an attacker who cares, in order for it to matter.
For example, let's say you're cheating on your wife, and, let's say, you connected to your girlfriend's SSID, called "GIRLFRIEND" and, let's say, for now, she's *not* hiding her SSID. Guess what?
Your laptop (or phone) *still* has a record of that connection, which, if your wife cared to snoop, can see by looking at your laptop or phone.
Now, let's say, for argument's sake, that your wife doesn't have physical access to your laptop or phone, but, your girlfriend told her router to not broadcast her SSID, but that you connected to her SSID.
Guess what?
When you're at home, your laptop or phone first shouts out "Hey GIRLFRIEND, are you there?" and only when the router doesn't respond to that request, does your laptop or phone bother to go down the list of other stored or located SSIDs.
It's actually easier than that *if* you use an existing SSID and password since the rainbow tables will already have the hash value stored.
I'm not saying "I" care to to that, but someone might. As always, security is a thousand little things done right.
Depends on what you mean by "good" passphrase because you don't need
*any* passphrase to break into WPA2/PSK encryption because the "salt" is known (it's the SSID!) and if you use an *existing* passphrase, you're already doomed.
formatting link
So, you have to substitute *unique* for "good", and only then the rainbow table hack won't work to break into your router.
Many years ago, I bought a copy of Doom to test a sound card (GUS MAX) -- on the advice of a friend.
In the late 70's, I was involved in the (arcade) video gaming industry. My idea of "video game violence" was pretty naive. I was caught completely off guard by Doom's! :-/
Some months later, I was in a department store waiting in line to checkout. Woman in front of me had a copy of Doom (or one of the sequels) that she was buying for her grandson. I just frowned and shook my head.
Later, felt like I'd been too judgemental -- who am *I* to say what's appropriate for *her* grandkid? OTOH, the fact that she'd asked my opinion meant I was, at least, *entitled* to give voice to it!
The more interesting thing re: *my* experience (with Doom et al.) was how *quickly* I became desensitized to the *gore* (and violence). I think back to what was considered offensive when I was growing up -- and what is now commonplace!
I can remember an *intervening* time when all the "splat" scenes in the Roadrunner cartoons were elided "to reduce violence in children's programming".
[IMO, Roadrunner is the most clever cartoon series out there -- second only to some of the operatic Bugs Bunny's/Daffy Duck's!]
HomeOwnersHub website is not affiliated with any of the manufacturers or service providers discussed here.
All logos and trade names are the property of their respective owners.