Linksys WRV200 Appendix B Wireless Security Checklist, General Network Security Guidelines

Page 44

Appendix B

Appendix B:

Wireless Security Checklist

Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted. Since you cannot physically prevent someone from connecting to your wireless network, you need to take some additional steps to keep your network secure.

1.Change the default wireless network name or SSID

Wireless devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. This is the name of your wireless network, and can be up to 32 characters in length. Linksys wireless products use linksys as the default wireless network name. You should change the wireless network name to something unique to distinguish your wireless network from other wireless networks that may exist around you, but do not use personal information (such as your Social Security number) because this information may be available for anyone to see when browsing for wireless networks.

2. Change the default password

For wireless products such as access points, routers, and gateways, you will be asked for a password when you want to change their settings. These devices have a default password set by the factory. The Linksys default password is admin. Hackers know these defaults and may try to use them to access your wireless device and change your network settings. To thwart any unauthorized changes, customize the device’s password so it will be hard to guess.

3. Enable MAC address filtering

Linksys routers and gateways give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses. For example, you can specify the MAC address of each

Wireless Security Checklist

computer in your home so that only those computers can access your wireless network.

4. Enable encryption

Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency Privacy (WEP) offer different levels of security for wireless communication. Currently, devices that are Wi-Fi certified are required to support WPA2, but are not required to support WEP.

A network encrypted with WPA/WPA2 is more secure than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. To protect the information as it passes over the airwaves, you should enable the highest level of encryption supported by your network equipment.

WEP is an older encryption standard and may be the only option available on some older devices that do not support WPA.

General Network Security Guidelines

Wireless network security is useless if the underlying network is not secure.

Password protect all computers on the network and individually password protect sensitive files.

Change passwords on a regular basis.

Install anti-virus software and personal firewall software.

Disable file sharing (peer-to-peer). Some applications may open file sharing without your consent and/or knowledge.

Additional Security Tips

Keep wireless routers, access points, or gateways away from exterior walls and windows.

Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations).

Use strong passphrases that are at least eight characters in length. Combine letters and numbers to avoid using standard words that can be found in the dictionary.

Wireless-G VPN Router with RangeBooster

39

Image 44
Contents Wireless-G VPN Router with RangeBooster About This Guide About This GuideTable of Contents Appendix a Troubleshooting Appendix B Wireless Security ChecklistAppendix J Contact Information Appendix E Gateway-to-Gateway VPN TunnelAppendix I Regulatory Information Chapter IntroductionChapter Planning Your Wireless Network Ad-Hoc versus Infrastructure ModeNetwork Topology Network LayoutChapter Planning Your Virtual Private Network VPN Why do I need a VPN?What is a VPN? Computer using the Linksys VPN client software to VPN Router VPN Router to VPN RouterChapter Product Overview Product OverviewFront Panel Back PanelChapter Configuring the Wireless-G VPN Router OverviewHow to Access the Web-based Utility SetupSetup Basic Settings Internet SetupPptp Optional Settings Required by some ISPs LAN SetupTime Settings Setup VlanSetup Ddns Setup MAC Address Clone DdnsStatic Routing Setup Advanced RoutingDynamic Routing Wireless Wireless Basic Wireless SettingsWireless Wireless Security Wireless Network ModeWPA2 Enterprise WPA2 PersonalWPA Enterprise WPA2 Personal Mixed WPA2 Enterprise MixedWireless Wireless Network Access Wireless Network AccessAdvanced Wireless Settings Wireless Advanced Wireless SettingsWireless WDS Firewall Firewall GeneralFirewall Port Forwarding Internet BlockFirewall Port Triggering Firewall DMZFirewall URL Filtering Firewall Access RestrictionVPN VPN Client Access Certificate Management VPN VPN PassthroughVPN Client List Table Remote Secure Group VPN IPSec VPNLocal Secure Group Tunnel Options Remote Secure GatewayKey Management VPN VPN Summary QoS QoS Application-Based QoSQoS Port-Based QoS Priority QueueAdministration Administration ManagementAdmin Password Local Router AccessUPnP Administration LogBackup and Restore Administration Diagnostics Administration Factory DefaultAdministration Firmware Upgrade Ping TestAdministration Reboot StatusStatus Router InformationStatus Wireless Status Local NetworkStatus System Performance Local NetworkVPN Summary Status VPN ClientsSystem Performance Appendix a Troubleshooting TroubleshootingAppendix a WindowsTroubleshooting Need to set up a server behind my Router Click Save Settings Go to the Firewall DMZ tab Go to the Setup Basic Setup tab Click the Firewall Port Triggering tabFrequently Asked Questions WRV200 does not support NetBIOS Broadcast overIs the Router cross-platform compatible? Appendix B Wireless Security Checklist Wireless Security ChecklistAppendix B General Network Security GuidelinesInstalling from the CD-ROM Appendix CAppendix C Overview Before You BeginUsing the Linksys QuickVPN Software Version Number of the QuickVPN Client\Program Files\Linksys\QuickVPN Client\ Select VPN, then VPN Client AccessDistributing Certificates to QuickVPN Users Appendix D IntroductionEnvironment Create an IPSec PolicyFilter List 2 router win Configure Individual Tunnel Rules Tunnel 1 win-RouterTunnel 2 Router-win Rules Tab Your tunnel should now be established Assign New IPSec PolicyCreate a Tunnel Through the Web-Based Utility Configuration of the WRV200 Appendix EAppendix E Gateway-to-Gateway VPN Tunnel Click IPSec VPNClick the Gateway to Gateway tab Configuration of the RV082Configuration of PC 1 and PC RV082 WRV200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses RV082 VPN Settings Appendix F Appendix F GlossaryGlossary Http HyperText Transport ProtocolGlossary Smtp Simple Mail Transfer Protocol The standard eAppendix F Appendix G Appendix G SpecificationsSpecifications Specifications Warranty Information Obtaining Warranty ServiceAppendix H Exclusions and LimitationsWarranty Information Technical SupportAppendix Regulatory InformationWireless Disclaimer Avis d’Industrie CanadaDansk Danish Miljøinformation for kunder i EU Appendix Norsk Norwegian Miljøinformasjon for kunder i EU Appendix Appendix J Contact Information
Related manuals
Manual 2 pages 11.27 Kb