Linksys WAP54G manual Security Threats Facing Wireless Networks

Page 69

Wireless-G Access Point

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Four modes are available: WPA-Personal, WPA2-Personal, WPA-Enterprise, and RADIUS. WPA-Personal gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption Standard), which utilizes a symmetric 128-Bit block data encryption. WPA2-Personal only uses AES encryption, which is stronger than TKIP. WPA-Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication.

Appendix B: Wireless Security

IMPORTANT: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

62

Security Threats Facing Wireless Networks

Image 69
Contents 802 GHz .11g Wireless- G Copyright and Trademarks How to Use this User GuideTable of Contents Appendix a Troubleshooting Appendix B Wireless SecurityFrequently Asked Questions Back Panel Front Panel25 Congratulations Screen Site Survey Screen Welcome IntroductionWhat’s in this User Guide? Wireless-G Access Point Planning Your Wireless Network Network TopologyRoaming Network Layout Cisco logo Getting to Know the Wireless-G Access PointBack Panel LAN Port Connecting the Wireless-G Access Point Connections for SetupOverview Using the Setup Wizard Setting up the Wireless-G Access PointConnect the Network Cable to the Router or Switch Screen Check the Access Point’s Status Screen Password Screen Basic Settings Screen 10 SecureEasySetup Screen Using the Access Point’s SecureEasySetup Feature15 Confirm New Settings Screen 16 Congratulations Screen Configuring a Non-SecureEasySetup Device17 Configure Wireless Settings Screen Manually Configuring the Access Point’s Wireless SettingsWEP 128-Bit WEP 64-BitWPA2 Personal WPA PersonalWPA2 Mixed Mode Linksys Wireless GuardWPA Enterprise 25 Congratulations Screen 26 Attention Screen Configuring the Linksys Wireless Guard Settings28 Securing Your Access Point Screen 31 Wireless Guard Congratulations Screen Client Software Installation Using the Linksys Wireless Guard ServiceExit Other Applications Destination Location Restart Your Computer Network AccessYour Account Accessing your AccountAdd a Guest 11 Network Administration12 Modify Access Control Member Registration Add a Member16 Subscriber Information 18 Credentials Information Securing or Unprotecting Your Wireless Guard Network To unprotect a networkTo secure an unprotected network Configuring the Wireless-G Access Point SetupNavigating the Utility Wireless AdministrationStatus Setup Network Setup Tab Accessing the UtilityNetwork Setup Configuration TypeSetup Static IP Screen Setup AP Mode Tab AP ModeLAN MAC Address Configuring the Wireless-G Access Point Setup AP Mode Tab Wireless-G Access Point Basic Wireless Settings Wireless Basic Wireless Settings Tab12 Confirm Reset Wireless Security Wireless Wireless Security TabWPA-Personal WPA2-PersonalWPA-Enterprise WPA2-MixedRadius Wireless Wireless MAC Filter Tab Wireless MAC FilterAccess Restriction Advanced Wireless Wireless Advanced Wireless Settings TabWireless-G Access Point AP’s Password Administration Management TabBackup and Restore ManagementAdministration Snmp Tab Snmp V1/V2cSnmp Community Log Administration Log TabAdministration Firmware Upgrade Tab Administration Factory Defaults TabFirmware Upgrade Factory DefaultsStatus Local Network Tab AP’s InformationLocal Network Wireless Network Status Wireless Network TabFrequently Asked Questions Appendix a TroubleshootingWhat Ieee 802.11g features are supported? What is the ISM band? Does the Access Point function as a firewall? Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Security Threats Facing Wireless Networks Wireless-G Access Point Appendix C Upgrading Firmware Figure C-1 Firmware UpgradeAppendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G Access Point Wireless-G Access Point Wireless-G Access Point Wireless-G Access Point Wireless-G Access Point Wireless-G Access Point Appendix F Specifications Operating Humidity Limited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationAppendix I Contact Information Need to contact Linksys?Information section in this Guide
Related manuals
Manual 2 pages 49.81 Kb