Cisco Systems WRT610N manual General Network Security Guidelines, Additional Security Tips

Page 7

Chapter 2

Wireless Security Checklist

Chapter 2:

Wireless Security Checklist

Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted. Since you cannot physically prevent someone from connecting to your wireless network, you need to take some additional steps to keep your network secure.

1.Change the default wireless network name or SSID

Wireless devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. This is the name of your wireless network, and can be up to 32 characters in length. Linksys wireless products use linksys as the default wireless network name. You should change the wireless network name to something unique to distinguish your wireless network from other wireless networks that may exist around you, but do not use personal information (such as your Social Security number) because this information may be available for anyone to see when browsing for wireless networks.

2. Change the default password

For wireless products such as access points and routers, you will be asked for a password when you want to change their settings. These devices have a default password set by the factory. The Linksys default password is admin. Hackers know these defaults and may try to use them to access your wireless device and change your network settings. To thwart any unauthorized changes, customize the device’s password so it will be hard to guess.

3. Enable MAC address filtering

Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so that only those computers can access your wireless network.

4. Enable encryption

Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalent Privacy (WEP) offer different levels of security for wireless communication.

A network encrypted with WPA/WPA2 is more secure than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. To protect the information as it passes over the airwaves, you should enable the highest level of encryption supported by your network equipment.

WEP is an older encryption standard and may be the only option available on some older devices that do not support WPA.

General Network Security Guidelines

Wireless network security is useless if the underlying network is not secure.

•• Password protect all computers on the network and individually password protect sensitive files.

•• Change passwords on a regular basis.

•• Install anti-virus software and personal firewall software.

•• Disable file sharing (peer-to-peer). Some applications may open file sharing without your consent and/or knowledge.

Additional Security Tips

•• Keep wireless routers, access points, or gateways away from exterior walls and windows.

•• Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations).

•• Use strong passphrases that are at least eight characters in length. Combine letters and numbers to avoid using standard words that can be found in the dictionary.

WEB:Formoreinformationonwirelesssecurity, visit www.linksysbycisco.com/security

Simultaneous Dual-Band Wireless-N Gigabit Router

5

Image 7
Contents Simultaneous Dual-Band Wireless-N Gigabit Router Online Resources Icon DescriptionsCopyright and Trademarks Table of Contents Appendix E Regulatory Information Appendix C Specifications Appendix D Warranty InformationAppendix F Software End User License Agreement Back Panel Front PanelWall-Mounting Placement Horizontal PlacementAdditional Security Tips General Network Security GuidelinesLanguage Setup Basic SetupHow to Access the Browser-Based Utility Internet SetupStatic IP Automatic Configuration DhcpPPPoE Telstra Cable Optional SettingsDhcp Reservation Network SetupDhcp Server Settings Router AddressDynDNS.org Setup DdnsTime Setting Ddns ServiceAdvanced Routing Setup MAC Address CloneSetup Advanced Routing MAC Address CloneSimultaneous Networks Wireless Basic Wireless SettingsWireless Configuration Manual GHz or 2.4 GHz Wireless SettingsWi-Fi Protected Setup WPA2 Personal Wireless Wireless SecurityGHz or 2.4 GHz Wireless Security Security ModeWPA Enterprise WPA2 EnterpriseRadius Access Restriction Wireless Wireless MAC FilterWireless MAC Filter Advanced WirelessAdvanced Configuration Web Filters Security FirewallSecurity VPN Passthrough FirewallFormat Disk Storage DiskDisk Detail Shared FolderDatabase SetupAccess Storage Media ServerMedia Folder AccessStorage FTP Server Add a Media FolderInformation Storage AdministrationCreate or Edit an FTP Folder Create or Edit a Group Account User ManagementGroup Management Create or Edit a User AccountSummary Internet Access PolicyPort Range Forwarding Applications and Gaming Single Port ForwardingApplications and Gaming Port Range Forwarding Single Port ForwardingApplications and Gaming DMZ Applications & Gaming Port Range TriggeringPort Range Triggering Applications and Gaming QoS QoS Quality of ServiceEthernet Port Online GamesAdd a New Game MAC AddressRouter Password Administration ManagementSummary Log Administration LogAdministration Diagnostics Backup and RestoreFactory Defaults Administration Factory DefaultsAdministration Firmware Upgrade DiagnosticsStatus Local Network Status Router5GHz/2.4GHz Wireless Network Status Wireless NetworkAppendix a Troubleshooting Click the Administration tab Windows Vista Install the USB Storage DeviceAccess the USB Storage Device OverviewMap a Drive Create a Shortcut to a Shared FolderAccess Mapped Drive Access the Browser-Based Utility Advanced Configuration Advanced Users OnlyCreate a Shared Folder Create a User Group Account Create a User Account Appendix C Specifications Exclusions and Limitations Limited WarrantyObtaining Warranty Service Technical Support Restrictions in the 5 GHz Band Safety Notices Industry Canada StatementFCC Statement FCC Radiation Exposure StatementAvis d’Industrie Canada Wireless DisclaimerRestrictions dans la bande 5 GHz Dansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Software Licenses Cisco ProductsSchedule Cisco Software License Agreement Software End User License Agreement Software End User License Agreement Schedule Network Magic Features Schedule 3-A Schedule Open Source and Third Party LicensesPreamble Software End User License Agreement No Warranty GNU Lesser General Public License Schedule 3-BSoftware End User License Agreement Software End User License Agreement Software End User License Agreement END of Schedule 3-B OpenSSL License Schedule 3-COriginal SSLeay License END of Schedule 3-C