Cisco Systems WRV54G manual 8WEP

Page 71

Wireless-G VPN Broadband Router

There are a few things you can do to make your SSID more secure:

a. Disable Broadcast

b. Make it unique

c. Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. This is a option for convenience, allowing anyone to log into your wireless network. In this case, however, anyone includes hackers. So don't broadcast the SSID.

A default SSID is set on your wireless devices by the factory. (The Linksys default SSID is "linksys".) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Changing your SSID regularly will force any hacker attempting to gain access to your wireless network to start looking for that new SSID.

With these three steps in mind, please remember that while SSIDs are good for segmenting networks, they fall short with regards to security. Hackers can usually find them quite easily.

6)MAC addresses

Enable MAC address filtering if your wireless products allow it. MAC address filtering will allow you to provide access to only those wireless nodes with certain MAC addresses. This makes it harder for a hacker using a random MAC address or spoofing (faking) a MAC address.

7)Firewalls

You can use the same firewall technology to protect your wired network from hackers coming in through your wireless network as you did for the Internet. The firewall will protect your network from any transmissions entering via your wireless network.

8)WEP

Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is overstating WEP's ability. Again, this can only provide enough security to make a hacker's job more difficult.

WEP encryption implementation was not put in place with the 802.11 standard. This means that there are about as many methods of WEP encryption as there are providers of wireless networking products. In addition, WEP is

Appendix B: Wireless Security

67

What Are The Risks?

Image 71
Contents 802 GHz .11g Wireless- G Word definition How to Use this GuideCopyright and Trademarks Table of Contents Frequently Asked Questions Wireless SecurityWelcome IntroductionWhat’s in this Guide? Wireless-G Broadband VPN Router What’s an IP Address? Planning your Wireless NetworkRouter’s Functions IP AddressesDynamic IP Addresses Why do I need a VPN?Dhcp Dynamic Host Configuration Protocol Servers What is a VPN? VPN Router to VPN Router Wireless-G VPN Broadband Router Back Panel Getting to Know the Wireless-G VPN Broadband RouterDMZ Front PanelOverview Connecting the Wireless-G Broadband RouterWireless Connection to a PC Wired Connection to a PCWireless-G VPN Broadband Router Configuring Windows 98 and Millennium PCs Configuring the PCsProperties Configuring Windows 2000 PCsConfiguring Windows XP PCs Wireless Configuring the RouterSetup Applications & Gaming Access RestrictionsAdministration SecurityInternet Setup How to Access the Web-based UtilitySetup Tab Basic Setup TabStatic Internet Connection Type Pptp Internet Connection Type Optional Settings Required by some ISPsNetwork Setup DynDNS.org Ddns TabAdvanced Routing MAC Address Clone Tab See FigureAdvanced Routing Tab MAC Clone10 Routing Table Static RoutingWireless Network Wireless TabBasic Wireless Settings See Figure WEP See Figure Wireless Security13 Wireless Network Access Wireless Network Access See Figure15 Advanced Wireless Settings Advanced Wireless Settings See FigureFirewall Security TabVPN 18 Manual Key Management 19 Advanced VPN Tunnel Setup WEP Access Restriction Access Restrictions Tab23 Internet Filter Summary Port Range Forwarding Applications and Gaming Tab27 Port Triggering Port Triggering28 UPnP Forwarding UPnP ForwardingDMZ Management Administration TabRouter Password Syslog Notification LogUPnP Email AlertGeneral Log DiagnosticsNotification Queue Length Alert Log33 Factory Default WAN Connections StatusRouter Information36 Local Network Local NetworkSystem Performance 38 WirelessNeed to set a static IP address on a PC Appendix a TroubleshootingCommon Problems and Solutions Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router TCP UDP Can’t get the Internet game, server, or application to work Firmware upgrade failed, and/or the Power LED is flashing To start over, I need to set the Router to factory defaultNeed to upgrade the firmware Power LED flashes continuously My DSL service’s PPPoE is always disconnectingDoes the Router support IPX or AppleTalk? Frequently Asked QuestionsWhere is the Router installed on the network? Is IPSec Pass-Through supported by the Router?Does the Router support ICQ send file? What is Network Address Translation and what is it used for?How can I block corrupted FTP downloads? How many ports can be simultaneously forwarded? What is DMZ Hosting?What are the advanced features of the Router? Is the Router cross-platform compatible?What is infrastructure mode? What is the Ieee 802.11g standard?What Ieee 802.11b features are supported? What is ad-hoc mode?What is WEP? What is ISM band?What is Spread Spectrum? What is DSSS? What is FHSS? And what are their differences?Have excellent signal strength, but I cannot see my network How do I reset the Router?How do I resolve issues with signal loss? What Are The Risks? Appendix B Wireless SecurityBrief Overview Jamming Attacks Passive AttacksMan-in-the-Middle Attacks Maximizing Wireless SecurityActive Attacks Dictionary-Building or Table Attacks5SSID 8WEP Wireless-G VPN Broadband Router Figure B-2 WEP 4GHz/802.11b and 802.11g WEP EncryptionWRV54G EnvironmentFilter List 1 win-router How to Establish a Secure IPSec TunnelCreate an IPSec Policy Build Filter ListsFigure C-4 IP Filter List Filter List 2 router-winFigure C-7 IP Filter List Tunnel 1 win-router Configure Individual Tunnel RulesFigure C-13 Authentication Methods Tunnel 2 router-win Figure C-16 Tunnel Setting TabFigure C-19 IP Filter List Tab Figure C-22 Preshared Key Figure C-25 Connection Type Assign New IPSec PolicyFigure C-28 VPN Tab Create a Tunnel Through the Web-Based UtilityWindows 98 or Me Instructions Figure D-1 IP Configuration ScreenFigure D-3 MAC Address/Physical Address Windows 2000 or XP InstructionsAppendix E Snmp Functions Appendix F Upgrading Firmware Figure F-1 Upgrade FirmwareNetwork Neighborhood/My Network Places Appendix G Windows HelpShared Resources Appendix H Glossary Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Up to 54Mbps wireless, up to 100 Mbps LAN Appendix I SpecificationsTransmit Power 19dBm LEDs FCC Statement Appendix J Regulatory InformationFCC Part 68 Statement Safety Notices Limited Warranty Appendix K Warranty InformationAppendix L Contact Information