Linksys WET54G V3 manual Appendix B Wireless Security, Security Precautions

Page 38

Wireless-G Ethernet Bridge

Appendix B: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

Security Precautions

The following is a complete list of security precautions to take (at least steps 1 through 5 should be followed):

1.Change the default SSID.

2.Disable SSID Broadcast.

3.Change the default password for the Administrator account.

4.Enable MAC Address Filtering.

5.Change the SSID periodically.

6.Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce your network performance.

7.Change the WEP encryption keys periodically.

For information on implementing these security features, refer to “Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Setup.”

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

Appendix B: Wireless Security

Note: Some of these security features are available only through the network router or access point. Refer to the router or access point’s documentation for more information.

32

Security Precautions

Image 38
Contents Wireless- G How to Use this Guide Copyright and TrademarksTable of Contents Wireless-G Ethernet Bridge Infrastructure Network Ad-Hoc Network10 RADIUS-TTLS Introduction What’s in this Guide? Wireless-G Ethernet Bridge Network Topology Planning Your Wireless NetworkAd-Hoc versus Infrastructure Mode Network Layout Ad-Hoc NetworkGettingtoKnowtheWireless-GEthernetBridge LANFront Panel Connecting the Wireless-G Ethernet Bridge for Setup Connect the PowerSetting Up the Wireless-G Ethernet Bridge WelcomeList of Bridges Wireless Settings Security Settings-WEP 10 Confirmation Connection to a Network Device Connecting the Wireless-G Ethernet Bridge for Network UsePlacement Options Wall Mount OptionVertical Placement Stand OptionStarting the Web-based Utility Using the Wireless-G Ethernet Bridge Web-based UtilityOverview Setup WirelessSite Survey WEP WEPWPA Pre-Shared Key Radius MD5TLS RADIUS-TLSTtls 10 RADIUS-TTLSAdvanced Settings 11 Password TabMAC Address Status LAN SettingsWireless Settings LAN StatisticsHelp 14 Help TabAppendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions Web-based Utility won’t openWhat is ad-hoc mode? What is ISM band? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-G Ethernet Bridge Figure C-1 Firmware Upgrade Appendix C Upgrading FirmwareNetwork Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Wireless-G Ethernet Bridge Appendix F Specifications Operating Humidity Warranty Year LimitedStorage Temp Storage HumidityAppendix G Warranty Information Limited WarrantyIndustry Canada Canada Appendix H Regulatory InformationFCC Statement EC Declaration of Conformity EuropeSafety Notices FranceAppendix I Contact Information