Linksys Network Router specifications Appendix B Wireless Security, Security Precautions

Page 27
Appendix B: Wireless Security

Wireless-G Range Expander

Appendix B: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

Security Precautions

The following is a complete list of security precautions to take (as shown in this User Guide) (at least steps 1 through 5 should be followed):

1.Change the default SSID.

2.Disable SSID Broadcast.

3.Change the default password for the Administrator account.

4.Enable MAC Address Filtering.

5.Change the SSID periodically.

6.Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce your network performance.

7.Change the WEP encryption keys periodically.

To ensure network security, steps one through five should be followed, at least.

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

Appendix B: Wireless Security

Note: Some of these security features are available only through the network router or access point. Refer to the router or access point’s documentation for more information.

24

Security Precautions

Image 27
Contents How to Use this Guide Copyright and Trademarksword definition Table of Contents List of Figures adapter - a device that adds network functionality to your PC Chapter 1 IntroductionWelcome router - a networking device that connects multiple networks togetherWhat’s in this Guide? This appendix supplies the Range Expander’s regulatory information Appendix F Warranty InformationThis appendix supplies the Range Expander’s warranty information Appendix G Regulatory InformationRoaming Chapter 2 Planning your Wireless NetworkSSID your wireless networks name Network TopologyNetwork Layout no network with which to connect, this light will appear red Chapter 3 Getting to Know the Wireless-G Range ExpanderPower when there is network activityThe Power Plate Figure 3-3 The Two Prong Power Plate Figure 3-2 The Power Platewith Cord tcp/ip a set of instructions PCs use to communicate over a network Chapter 4 Connecting the Wireless-G Range ExpanderWall Mounting Chapter 5 Setting Up the Wireless-G Range Expander Figure 5-2 Connecting to an access point Click the Next button to continue or Exit to exit the Setup Wizard bit - a binary digit Figure 5-11 The Confirm New Settings screen Overview Chapter 6 Configuring the Wireless-G Range Expandersubnet mask an address code that determines the size of the network The Setup TabBasic Setup firmware the programming code that runs a networking deviceFigure 6-3 WEP Security screen encryption encoding data transmitted in a networksoftware instructions for the computer download to receive a file transmitted over a network PasswordHelp upgrade to replace existing software or firmware with a newer versionWhat IEEE 802.11b features are supported? Appendix A TroubleshootingCommon Problems and Solutions Frequently Asked QuestionsWhat is ISM band? What is Ad-hoc?What is Infrastructure? What is Roaming?What is WEP? What is Spread Spectrum?What is DSSS? What is FHSS? And what are their differences? Can Linksys Wireless products support file and printer sharing?How do I reset the Range Expander? How do I resolve issues with signal loss?How do I avoid interference? Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks SSID. There are several things to keep in mind about the SSID WPA Pre-Shared Key. If you do not have a RADIUS server, select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption keys Appendix C Upgrading Firmware Network Neighborhood/My Network Places Appendix D Windows HelpTCP/IP Shared ResourcesAppendix E Glossary Encryption - Encoding data transmitted in a network Router - A networking device that connects multiple networks together Appendix F Specifications Appendix G Warranty Information Appendix H Regulatory Information EN 609 50 Safety An FCC compliant telephone cord and modular plug is provided with this equipment. This equipment is designed to be connected to the telephone network or premises wiring using a compatible modular jack, which is FCC Part 68 compliant. Connection to the telephone network should be made by using the standard modular telephone jack Appendix H Regulatory Information Appendix I Contact Information Range Expander 2.4 802 GHz .11g Wireless- GWIRELESS User Guide