Linksys Network Router SSID. There are several things to keep in mind about the SSID

Page 28
SSID. There are several things to keep in mind about the SSID:

Wireless-G Range Expander

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: Pre-Shared Key and RADIUS. Pre-Shared Key gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes

asymmetric 128-Bit block data encryption. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication and the use of dynamic TKIP, AES, or WEP.

Appendix B: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

25

Security Threats Facing Wireless Networks

Image 28
Contents Copyright and Trademarks How to Use this Guideword definition Table of Contents List of Figures Chapter 1 Introduction Welcomerouter - a networking device that connects multiple networks together adapter - a device that adds network functionality to your PCWhat’s in this Guide? Appendix F Warranty Information This appendix supplies the Range Expander’s warranty informationAppendix G Regulatory Information This appendix supplies the Range Expander’s regulatory informationChapter 2 Planning your Wireless Network SSID your wireless networks nameNetwork Topology RoamingNetwork Layout Chapter 3 Getting to Know the Wireless-G Range Expander Powerwhen there is network activity no network with which to connect, this light will appear redFigure 3-3 The Two Prong Power Plate Figure 3-2 The Power Plate The Power Platewith Cord Chapter 4 Connecting the Wireless-G Range Expander tcp/ip a set of instructions PCs use to communicate over a networkWall Mounting Chapter 5 Setting Up the Wireless-G Range Expander Figure 5-2 Connecting to an access point Click the Next button to continue or Exit to exit the Setup Wizard bit - a binary digit Figure 5-11 The Confirm New Settings screen Chapter 6 Configuring the Wireless-G Range Expander OverviewThe Setup Tab Basic Setupfirmware the programming code that runs a networking device subnet mask an address code that determines the size of the networkencryption encoding data transmitted in a network Figure 6-3 WEP Security screensoftware instructions for the computer Password download to receive a file transmitted over a networkupgrade to replace existing software or firmware with a newer version HelpAppendix A Troubleshooting Common Problems and SolutionsFrequently Asked Questions What IEEE 802.11b features are supported?What is Ad-hoc? What is Infrastructure?What is Roaming? What is ISM band?What is Spread Spectrum? What is DSSS? What is FHSS? And what are their differences?Can Linksys Wireless products support file and printer sharing? What is WEP?How do I resolve issues with signal loss? How do I reset the Range Expander?How do I avoid interference? Security Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks SSID. There are several things to keep in mind about the SSID WPA Pre-Shared Key. If you do not have a RADIUS server, select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption keys Appendix C Upgrading Firmware Appendix D Windows Help TCP/IPShared Resources Network Neighborhood/My Network PlacesAppendix E Glossary Encryption - Encoding data transmitted in a network Router - A networking device that connects multiple networks together Appendix F Specifications Appendix G Warranty Information Appendix H Regulatory Information EN 609 50 Safety An FCC compliant telephone cord and modular plug is provided with this equipment. This equipment is designed to be connected to the telephone network or premises wiring using a compatible modular jack, which is FCC Part 68 compliant. Connection to the telephone network should be made by using the standard modular telephone jack Wireless-G Range Expander Appendix I Contact Information 2.4 802 GHz .11g Wireless- G WIRELESSUser Guide Range Expander