Linksys WET54GS5 manual Appendix B Wireless Security

Page 54

Wireless-G Ethernet Bridge with 5-Port Switch

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: Pre-Shared Key and RADIUS. Pre-Shared Key gives you a the encryption method TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers.RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication and the use of dynamic TKIP or WEP.

Appendix B: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

48

Security Threats Facing Wireless Networks

Image 54
Contents Wireless- G How to Use this Guide Copyright and TrademarksTable of Contents Appendix I Contact Information FCC Statement Industry Canada CanadaList of Figures Infrastructure Network10 WPA RADIUS-TTLS Introduction What’s in this Guide? Wireless-G Ethernet Bridge with 5-Port Switch Planning Your Wireless Network Ad-Hoc versus Infrastructure ModeNetwork Topology Network Layout Ad-Hoc NetworkBack Panel Front Panel Side Panel Power port is on the side panel. See Figure Connecting the Wireless-G Ethernet Bridge for Setup Wireless-G Ethernet Bridge with 5-Port Switch Setting Up the Wireless-G Ethernet Bridge WelcomePassword Mode Settings Wireless Settings Security Settings 10 Confirmation Connecting the Wireless-G Ethernet Bridge for Network Use Wall Mount Placement OptionConnection to a Network Device Using the Wireless-G Ethernet Bridge Web-based Utility OverviewStarting the Web-based Utility Setup LANSite Survey WEP Radius TLS Ttls WPA Radius 10 WPA RADIUS-TTLS 11 WPA Pre-Shared Key 13 Password Tab Wireless Advanced WirelessMAC Address Switch Tab Spanning Tree ProtocolQOS Switch Table 17 Switch Table TabVlan Wireless-G Ethernet Bridge with 5-Port Switch Rmon Statistics 19 Rmon Statistics TabWireless-G Ethernet Bridge with 5-Port Switch Port Mirroring Port Information TableAccess List 21 Access List TabWireless Settings Wireless StatusLAN Settings StatisticsSnmp Help 24 Help TabAppendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions Web-based Utility won’t openWhat is ad-hoc mode? What is ISM band? Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Ethernet Bridge with 5-Port Switch Figure C-1 Firmware Upgrade Appendix C Upgrading FirmwareAppendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Wireless-G Ethernet Bridge with 5-Port Switch Model Appendix F SpecificationsSecurity Feature StandardsStorage Temp Warranty Year Limited WarrantyOperating Temp Operating HumidityAppendix G Warranty Information Limited WarrantyIndustry Canada Canada Appendix H Regulatory InformationFCC Statement FCC Radiation Exposure StatementAppendix I Contact Information