Linksys WET200 Appendix a Wireless Security Checklist, General Network Security Guidelines

Page 26

Appendix A

Appendix A:

Wireless Security Checklist

Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted. Since you cannot physically prevent someone from connecting to your wireless network, you need to take some additional steps to keep your network secure.

1.Change the default wireless network name or SSID

Wireless devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. This is the name of your wireless network, and can be up to 32 characters in length. Linksys wireless products use linksys as the default wireless network name. You should change the wireless network name to something unique to distinguish your wireless network from other wireless networks that may exist around you, but do not use personal information (such as your Social Security number) because this information may be available for anyone to see when browsing for wireless networks.

2. Change the default password

For wireless products such as access points and routers, you will be asked for a password when you want to change their settings. These devices have a default password set by the factory. The Linksys default password is admin. Hackers know these defaults and may try to use them to access your wireless device and change your network settings. To thwart any unauthorized changes, customize the device’s password so it will be hard to guess.

3. Enable MAC address filtering

Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so that only those computers can access your wireless network.

Wireless Security Checklist

4. Enable encryption

Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency Privacy (WEP) offer different levels of security for wireless communication. Currently, devices that are Wi-Fi certified are required to support WPA2, but are not required to support WEP.

A network encrypted with WPA/WPA2 is more secure than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. To protect the information as it passes over the airwaves, you should enable the highest level of encryption supported by your network equipment.

WEP is an older encryption standard and may be the only option available on some older devices that do not support WPA.

General Network Security Guidelines

Wireless network security is useless if the underlying network is not secure.

•• Password protect all computers on the network and individually password protect sensitive files.

•• Change passwords on a regular basis.

•• Install anti-virus software and personal firewall software.

•• Disable file sharing (peer-to-peer). Some applications may open file sharing without your consent and/or knowledge.

Additional Security Tips

•• Keep wireless routers, access points, or gateways away from exterior walls and windows.

•• Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations).

•• Use strong passphrases that are at least eight characters in length. Combine letters and numbers to avoid using standard words that can be found in the dictionary.

Wireless-G Business Ethernet Bridge

22

Image 26
Contents Wireless-G Business Ethernet Bridge Icon Descriptions About This GuideAbout This Guide Online ResourcesTable of Contents Appendix E Regulatory Information Appendix a Wireless Security ChecklistAppendix B Glossary Chapter Chapter IntroductionNetwork Layout Chapter Planning Your Wireless NetworkNetwork Topology Example of WET200 in Ad-Hoc Mode Front Panel Chapter Product OverviewProduct Overview Back PanelPlacement Options Chapter InstallationInstallation OverviewInstallation Wall-Mount OptionSetup Chapter Quick Configuration OverviewAccessing the Web-Based Utility WirelessSystem Status SwitchAdministration Setup Chapter Advanced ConfigurationAdvanced Configuration Wireless Site Survey WirelessWireless Basic Settings Wireless Wireless Security WPA-Personal aka WPA-PSKWPA2-Enterprise WPA2-PersonalWPA-Enterprise Switch Port Management SwitchWireless Advanced Settings Port Mirroring Setting Switch Port MirroringSwitch Vlan 802.1Q Switch MAC Based ACL Port-BasedSwitch QoS Switch Spanning TreeAdministration Password AdministrationSwitch MAC Table Administration Web AccessAdministration Snmp Administration Factory DefaultsSystem Status Administration Firmware UpgradeSystem Status Wireless Status System Status System StatusPersonal, etc System Status Port StatisticsAd-Hoc Appendix a Appendix a Wireless Security ChecklistWireless Security Checklist General Network Security GuidelinesGlossary Appendix BAppendix B Glossary Glossary Http HyperText Transport ProtocolSmtp Simple Mail Transfer Protocol The standard e Snmp Simple Network Management Protocol aAppendix B Appendix C Appendix C SpecificationsSpecifications Appendix D Warranty InformationLimited Warranty Appendix E Regulatory InformationWireless Disclaimer Avis d’Industrie CanadaDansk Danish Miljøinformation for kunder i EU Appendix E Norsk Norwegian Miljøinformasjon for kunder i EU Appendix E Appendix F Contact Information
Related manuals
Manual 3 pages 10.7 Kb

WET200 specifications

The Linksys WET200 Wireless-G Ethernet Bridge is designed for businesses looking to extend their network capabilities without the hassle of running Ethernet cables throughout their premises. This high-performance device effectively connects wired devices to a wireless network, providing businesses with efficient access to internet resources and network shares.

One of the standout features of the WET200 is its dual-functionality. It operates as both an Ethernet bridge and a wireless access point, allowing users to connect multiple wired devices, such as printers, servers, or computers, to a wireless network. This flexibility makes it an excellent choice for environments where network mobility is crucial, such as offices, retail establishments, and warehouses.

Another key characteristic of the Linksys WET200 is its support for Wireless-G technology, offering a maximum wireless speed of up to 54 Mbps. This ensures that data transfer between connected devices is quick and reliable while providing adequate bandwidth for various applications, including file sharing and streaming. The device also adheres to the IEEE 802.11b/g standard, which means it is compatible with a vast number of other wireless devices.

The WET200 features a simple setup process, aided by its web-based configuration interface. This user-friendly interface allows for easy management of networking settings, making it accessible for both novice and experienced users. Security is a significant consideration, and the WET200 includes robust encryption protocols such as WEP, WPA, and WPA2 to protect data transmission over the wireless network.

Moreover, the Ethernet Bridge is equipped with two 10/100 Ethernet ports, enabling connections to multiple wired devices simultaneously. Its compact design allows for easy placement in various locations, and the inclusion of LEDs provides users with real-time feedback on connectivity status.

Overall, the Linksys WET200 Wireless-G Ethernet Bridge stands out with its combination of performance, flexibility, and ease of use, making it an invaluable asset for businesses aiming to expand their wired network capabilities without compromising on performance or security. It's a smart solution for those who need to harness the power of wireless connectivity while ensuring that their critical wired devices remain connected to the network efficiently.