Linksys WPC54GX manual Appendix B Wireless Security, Security Precautions

Page 35

Wireless-G Notebook Adapter with SRX

Appendix B: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

Security Precautions

The following is a complete list of security precautions to take (at least steps 1 through 5 should be followed):

1.Change the default SSID.

2.Disable SSID Broadcast.

3.Change the default password for the Administrator account.

4.Enable MAC Address Filtering.

5.Change the SSID periodically.

6.Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce your network performance.

7.Change the WEP encryption keys periodically.

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

Appendix B: Wireless Security

NOTE: Some of these security features are available only through the network router or access point. Refer to the router or access point’s documentation for more information.

30

Security Precautions

Image 35
Contents Wireless- G Copyright and Trademarks Table of Contents Front Panel List of Figures22 Radius EAP-TLS What’s in this Guide? IntroductionWelcome Introduction What’s in this Guide? Roaming Planning Your Wireless NetworkNetwork Topology Network Layout LED Indicators Getting to Know the Wireless-G Notebook Adapter with SRXOverview Setting up the Wireless-G Notebook Adapter with SRXRunning the Setup Wizard Setup Wizard’s Ssid Wireless Network Name Screen WEP Setup Wizard’s Check Settings Screen Setup Wizard’s Congratulations Screen Link Information Using the Wireless Network MonitorAccessing the Wireless Network Monitor Wireless Network Status Wireless Network Statistics Site Information Site SurveyProfile Information ProfilesEnter Profile Name Creating a New Profile10 Wireless Mode for New Profile 12 Wireless Security WEP for New Profile 14 Wireless Security WPA-Personal 16 Wireless Security WPA-Enterprise EAP-TLS EAP-PEAP 22 Radius EAP-TLS 24 Radius EAP-PEAP 26 Congratulations Frequently Asked Questions Appendix a TroubleshootingCommon Problems and Solutions What is the Ieee 802.11b standard? What is roaming? What is WEP? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-G Notebook Adapter with SRX TCP/IP Appendix C Windows HelpAppendix D Glossary Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX WPC54GX Appendix E SpecificationsLimited Warranty Appendix F Warranty InformationFCC Statement Appendix G Regulatory InformationSafety Notices Appendix H Contact Information
Related manuals
Manual 51 pages 20.95 Kb