Cisco Systems WUSB54GSC manual Appendix C Wireless Security

Page 41

Compact Wireless-G USB Network Adapter with SpeedBooster

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Four modes are available: WPA-Personal, WPA2-Personal, WPA-Enterprise, and RADIUS. WPA-Personal gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption Standard), which utilizes a symmetric 128-Bit block data encryption. WPA2-Personal only uses AES encryption, which is stronger than TKIP. WPA-Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication.

Appendix C: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

35

Security Threats Facing Wireless Networks

Image 41
Contents Wireless- G Copyright and Trademarks How to Use this User GuideTable of Contents Compact Wireless-G USB Network Adapter with SpeedBooster Front Panel List of FiguresLink Information Welcome IntroductionWhat’s in this Guide? Compact Wireless-G USB Network Adapter with SpeedBooster Ssid your wireless network’s name Planning your Wireless NetworkNetwork Topology RoamingNetwork Layout Planning your Wireless NetworkLED Indicators Getting to Know the Compact Wireless-G USB Network AdapterStarting the Setup Wizard Setting up and Connecting the USB AdapterInstalling files Creating a Profile Creating a ProfileChanges, refer to Using the Wireless Network Monitor Setting Up the Adapter with SecureEasySetupEncryption encoding data transmitted in a network Setting Up the Adapter with Available Networks12 WEP Key Needed for Connection 14 WPA2-Personal Needed for Connection 17 Network Settings Setting Up the Adapter with Manual Setup18 Wireless Mode WEP WPA2 Personal WPA PersonalEAP-TLS WPA EnterpriseRadius 28 Confirm New Settings Accessing the Wireless Network Monitor Using the Wireless Network MonitorWireless Network Status screen Link Information ScreensWireless Network Status Link Information Wireless Network Statistics Wireless Network StatisticsSite Information Site SurveyProfile Information Profiles11 Export a Profile Creating a New ProfileCommon Problems and Solutions Appendix a TroubleshootingMy computer does not recognize the USB Adapter USB Adapter does not work properlyWhat is the Ieee 802.11b standard? Frequently Asked QuestionsWhat is the Ieee 802.11g standard? What Ieee 802.11b features are supported?What is infrastructure mode? What is ad-hoc mode?What is roaming? What is ISM band?What is WEP? What is DSSS? What is FHSS? And what are their differences?Figure B-1 Wireless Network Monitor Icon Appendix B Using Windows XP Wireless Configuration Figure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Threats Facing Wireless Networks Appendix C Wireless SecuritySecurity Precautions Appendix C Wireless Security Compact Wireless-G USB Network Adapter with SpeedBooster Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Compact Wireless-G USB Network Adapter with SpeedBooster Compact Wireless-G USB Network Adapter with SpeedBooster Compact Wireless-G USB Network Adapter with SpeedBooster Compact Wireless-G USB Network Adapter with SpeedBooster WUSB54GSC Appendix F SpecificationsLimited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationCompact Wireless-G USB Network Adapter with SpeedBooster Compact Wireless-G USB Network Adapter with SpeedBooster Compact Wireless-G USB Network Adapter with SpeedBooster Compact Wireless-G USB Network Adapter with SpeedBooster Dual-Band Wireless Access Point Appendix I Contact Information