Linksys WET54GS5 manual Appendix B Wireless Security, Security Precautions

Page 53

Wireless-G Ethernet Bridge with 5-Port Switch

Appendix B: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

Security Precautions

The following is a complete list of security precautions to take (at least steps 1 through 5 should be followed):

1.Change the default SSID.

2.Disable SSID Broadcast.

3.Change the default password for the Administrator account.

4.Enable MAC Address Filtering.

5.Change the SSID periodically.

6.Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce your network performance.

7.Change the WEP encryption keys periodically.

For information on implementing these security features, refer to “Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility.” The wireless security can be set up on this page.

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

Appendix B: Wireless Security

Note: Some of these security features are available only through the network router or access point. Refer to the router or access point’s documentation for more information.

47

Security Precautions

Image 53
Contents Wireless- G Copyright and Trademarks How to Use this GuideTable of Contents FCC Statement Industry Canada Canada Appendix I Contact InformationInfrastructure Network List of Figures10 WPA RADIUS-TTLS Introduction What’s in this Guide? Wireless-G Ethernet Bridge with 5-Port Switch Network Topology Planning Your Wireless NetworkAd-Hoc versus Infrastructure Mode Ad-Hoc Network Network LayoutBack Panel Front Panel Side Panel Power port is on the side panel. See Figure Connecting the Wireless-G Ethernet Bridge for Setup Wireless-G Ethernet Bridge with 5-Port Switch Welcome Setting Up the Wireless-G Ethernet BridgePassword Mode Settings Wireless Settings Security Settings 10 Confirmation Connection to a Network Device Connecting the Wireless-G Ethernet Bridge for Network UseWall Mount Placement Option Starting the Web-based Utility Using the Wireless-G Ethernet Bridge Web-based UtilityOverview LAN SetupSite Survey WEP Radius TLS Ttls WPA Radius 10 WPA RADIUS-TTLS 11 WPA Pre-Shared Key 13 Password Tab MAC Address WirelessAdvanced Wireless Spanning Tree Protocol Switch TabQOS 17 Switch Table Tab Switch TableVlan Wireless-G Ethernet Bridge with 5-Port Switch 19 Rmon Statistics Tab Rmon StatisticsWireless-G Ethernet Bridge with 5-Port Switch Port Information Table Port Mirroring21 Access List Tab Access ListLAN Settings Wireless StatusWireless Settings StatisticsSnmp 24 Help Tab HelpCommon Problems and Solutions Appendix a TroubleshootingWeb-based Utility won’t open Frequently Asked QuestionsWhat is ad-hoc mode? What is ISM band? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-G Ethernet Bridge with 5-Port Switch Appendix C Upgrading Firmware Figure C-1 Firmware UpgradeNetwork Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Security Feature Appendix F SpecificationsModel StandardsOperating Temp Warranty Year Limited WarrantyStorage Temp Operating HumidityLimited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationIndustry Canada Canada FCC Radiation Exposure StatementAppendix I Contact Information