Cisco Systems WRT54G manual Wep

Page 66

Wireless-G Broadband Router

PCs unprotected by a firewall router should at least run firewall software, and all PCs should run up-to-date antiviral software.

B. WEP

Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is overstating WEP's ability. Again, this can only provide enough security to make a hacker's job more difficult.

WEP encryption implementation was not put in place with the 802.11 standard. This means that there are about as many methods of WEP encryption as there are providers of wireless networking products. In addition, WEP is not completely secure. One piece of information still not encrypted is the MAC address, which hackers can use to break into a network by spoofing (or faking) the MAC address.

Programs exist on the Internet that are designed to defeat WEP. The best known of these is AirSnort. In about a day, AirSnort can analyze enough of the wireless transmissions to crack the WEP key. Just like a dictionary- building attack, the best prevention for these types of programs is by not using static settings, periodically changing WEP keys, SSID, etc.

There are several ways that WEP can be maximized:

a)Use the highest level of encryption possible

b)Use multiple WEP keys

c)Change your WEP key regularly

Current encryption technology offers 64-bit and 128-bit WEP encryption. If you are using 64-bit WEP, swap out your old wireless units for 128-bit encryption right away. Where encryption is concerned, the bigger and more complex, the better. A WEP key is a string of hexadecimal characters that your wireless network uses in two ways. First, nodes in your wireless network are identified with a common WEP key. Second, these WEP keys encrypt and decrypt data sent over your wireless network. So, a higher level of security ensures that hackers will have a harder time breaking into your network.

Setting one, static WEP key on your wireless network leaves your network open the threats even as you think it is protecting you. While it is true that using a WEP key increases wireless security, you can increase it further by using multiple WEP keys.

Keep in mind that WEP keys are stored in the firmware of wireless cards and access points and can be used to hack into the network if a card or access point falls into the wrong hands. Also, should someone hack into your network, there would be nothing preventing someone access to the entire network, using just one static key.

Appendix B: Wireless Security

57

Maximizing Wireless Security

Image 66
Contents Jameco Part Number 487058UsersGuide 54Mbps GHz Wireless- G Copyright and Trademarks Word definitionTable of Contents Appendix ATroubleshooting Appendix B Wireless SecurityList of Figures Broadband Router’s Back Panel18 Wireless Tab Advanced Wireless Settings Figure B-12 WEP Introduction WelcomeWhat’s in this Guide? Wireless-G Broadband Router Network Topology RoamingNetwork Layout Getting to Know the Wireless-G Broadband Router Back PanelFront Panel DMZConnecting the Wireless-G Broadband Router Hardware InstallationConnecting the Wireless-G Broadband Router Wireless-G Broadband Router Configuring the PCs Configuring Windows 98 and Millennium PCsOverview Configuring Windows 2000 PCs PropertiesConfiguring Windows XP PCs Configuring the PCs Configuring Windows XP PCs Configuring the Wireless-G Broadband Router Password ScreenSetup Tab Basic Setup Internet SetupPPPoE Connection Type Router IP Time Setting Setup Tab Ddns 11 Setup Tab DdnsSetup Tab MAC Address Clone 12 Setup Tab MAC Address CloneSetup Tab Advanced Routing 13 Setup Tab Advanced Routing GatewayWireless Tab Basic Wireless Settings CorrectlyWireless Tab Wireless MAC Filter 16 Wireless Tab Wireless MAC FilterWireless Tab Advanced Wireless Settings 18 Wireless Tab Advanced Wireless SettingsWireless-G Broadband Router Security Tab Firewall Security Tab VPN PassthroughSecurity Tab Wireless Security 21 Wireless Tab Wireless Security WPA Pre-Shared Key23 Wireless Tab Wireless Security Radius Access Restrictions Tab 25 Access Restrictions TabApplications and Gaming Tab Port Range Forward 28 Applications and Gaming Tab Port Range ForwardApplications and Gaming Tab DMZ 29 Applications and Gaming DMZAdministration Tab Management Administration Tab LogAdministration Tab Diagnostics 32 Administration Tab DiagnosticsAdministration Tab Factory Defaults Administration Tab Firmware UpgradeStatus Tab Router 37 Status Tab RouterStatus Tab Local Network 38 Status Tab Local NetworkStatus Tab Wireless 39 Status Tab WirelessAppendix a Troubleshooting Common Problems and SolutionsNeed to set a static IP address on a PC Open a command prompt. For Windows 98 and Me Wireless-G Broadband Router TCP UDP VPN Ipsec Can’t get the Internet game, server, or application to workTo start over, I need to set the Router to factory default Need to upgrade the firmwareFirmware upgrade failed, and/or the Power LED is flashing My DSL service’s PPPoE is always disconnecting Where is the Router installed on the network? Frequently Asked QuestionsPower LED keeps flashing Is IPSec Pass-Through supported by the Router?What is Network Address Translation and what is it used for? Does the Router support ICQ send file?How can I block corrupted FTP downloads? What is the Ieee 802.11g standard? What is DMZ Hosting?What are the advanced features of the Router? What Ieee 802.11b features are supported?What is roaming? What is ad-hoc mode?What is infrastructure mode? What is ISM band?What is WEP? What is Spread Spectrum?What is DSSS? What is FHSS? And what are their differences? What is a MAC Address?How do I resolve issues with signal loss? Have excellent signal strength, but I cannot see my networkAppendix B Wireless Security Brief OverviewWhat Are The Risks? Passive Attacks Maximizing Wireless Security Active AttacksCommon Sense Solutions Ssid WEP WPA WPA Radius Figure C-1 Upgrade Firmware Appendix C Upgrading FirmwareAppendix D Windows Help TCP/IPWindows 98 or Me Instructions Windows 2000 or XP InstructionsFor the Router’s Web-based Utility Figure E-3 MAC Address/Physical AddressAppendix F Glossary Wireless-G Broadband Router Wireless-G Broadband Router Wireless-G Broadband Router Wireless-G Broadband Router Wireless-G Broadband Router Appendix G Specifications Wireless-G Broadband Router Appendix H Warranty Information Limited WarrantyAppendix I Regulatory Information FCC StatementWireless-G Broadband Router Wireless-G Broadband Router Appendix J Contact Information

WRT54G specifications

The Cisco Systems WRT54G is a cornerstone of home and small office networking, renowned for its robust features and reliability since its release in 2002. Widely acknowledged as one of the first consumer-grade routers to combine wireless and wired networking capabilities, the WRT54G has earned a legacy as a hallmark of simplicity and performance.

At the heart of its functionality is the 802.11g wireless standard, which allows for wireless connections at speeds of up to 54 Mbps. This technology ensures a reliable connection over significant distances, making it suitable for various home and office environments. The WRT54G operates on the 2.4 GHz frequency band, which provides compatibility with many devices but can be susceptible to interference from other electronic devices.

One of the standout features of the WRT54G is its user-friendly web interface, allowing even non-technical users to easily configure their network settings. This feature promotes security by enabling users to modify their network name, set up encryption protocols like WEP or WPA, and create a guest network for visitors. The router also incorporates a built-in firewall and supports Network Address Translation (NAT), adding an additional layer of security to users’ private networks.

The WRT54G boasts four Ethernet ports for wired connections, accommodating multiple devices simultaneously. This feature is particularly beneficial for users with desktop computers, gaming consoles, or network-attached storage devices requiring stable, high-speed connections. The ability to connect devices through Ethernet ensures that users can enjoy the benefits of a reliable and fast network, especially in environments where wireless connectivity may be limited.

Another distinguishing characteristic of the WRT54G is its open-source firmware capability, which has led to a devoted community of enthusiasts who have developed alternative firmware for greater customization and advanced features. This flexibility not only enhances the router's lifespan but also caters to users who require specific functionalities, such as advanced Quality of Service (QoS) settings or more extensive parental controls.

In conclusion, the Cisco Systems WRT54G remains a significant player in the realm of consumer networking due to its innovative features, ease of use, and adaptability. While newer models have since emerged, the WRT54G's enduring reputation speaks to its reliability and solid performance, making it a preferred choice for many users seeking to establish a dependable network.