Linksys WRT330N manual Appendix B Wireless Security

Page 71

Wireless-N Gigabit Gaming Router

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

PSK. Pre-shared Key (PSK) is the newest and best available standard in Wi-Fi security. Two modes are available: PSK and Radius. PSK gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication.

Appendix B: Wireless Security

IMPORTANT: Always remember that each device in your wireless network MUST use the same security method and key, or else your wireless network will not function properly.

65

Security Threats Facing Wireless Networks

Image 71
Contents GHz Wireless- N Word definition How to Use This User GuideCopyright and Trademarks Table of Contents Appendix C Upgrading Firmware Appendix D Windows Help Appendix a TroubleshootingAppendix B Wireless Security Common Problems and Solutions Frequently Asked QuestionsRouter’s Front Panel Router’s Back Panel26 Security Tab VPN Passthrough Welcome IntroductionWhat’s in this User Guide? Wireless-N Gigabit Gaming Router Network Topology Planning Your Wireless NetworkAd-Hoc versus Infrastructure Mode Ssid service set identifier your wireless network’s namePlanning Your Wireless Network Network Layout Back Panel Getting to Know the Wireless-N Gigabit Gaming RouterTop Panel Front PanelHardware Installation Connecting the Wireless-N Gigabit Gaming RouterOverview Configuring the Wireless-N Gigabit Gaming RouterWireless Status How to Access the Web-based UtilityInternet Connection Type Setup Tab Basic SetupOptional Settings Required by some ISPs Network Address Server Settings DhcpPacket a unit of data sent over a network Time SettingSetup Basic Setup Static IP Setup Tab Basic Setup Static IPSeup Basic Setup PPoE Settings Setup Tab Basic Setup PPPoEWireless-N Gigabit Gaming Router Setup Basic Setuppptp Setup Tab Basic Setup PptpWireless-N Gigabit Gaming Router Setupbasic Setup Telstra BigPond Setup Tab Basic Setup Telstra BigPondDynamic DNS Setup Tab Dynamic DNSMac Cloning Setup Tab MAC Address CloneStatic Routing Setup Tab Advanced RoutingDynamic Routing Wireless Setting Wireless Tab Basic Wireless SettingsWireless Security Wireless Tab Wireless SecurityPSK Enterprise WEP Access Restrictions Wireless Tab Wireless MAC FilterWireless MAC Filter Advanced Wireless Setting Wireless Tab Advanced Wireless SettingsPriority Classifiers Wireless Tab QoSAdd/Edit Wireless QoS Rules QoSWireless QoS Rule List Block WAN Request Security Tab FirewallFirewall VPN Passthrough Security Tab VPN PassthroughSchedule Access Restrictions Tab Internet Access PolicyInternet Access Apply PolicyThree applications can be blocked per Policy Blocked ApplicationsSingle Port Forwarding Applications & Gaming Tab Single Port ForwardingPort Range Forwarding Applications & Gaming Tab Port Range ForwardingPort Range Triggering Applications & Gaming Tab Port Range TriggeringDMZ Applications & Gaming Tab DMZAdd QoS Rule QoS Quality of ServiceApplications & Gaming Tab QOS QoS Rule List Remote Router Access Administration Tab- ManagementLocal Router Access Https Web AccessMulticast RebootLog Details Administration Tab LOGLog Options Traceroute Test Administration Tab DiagnosticsPing Test Factory Defaults Administration Tab Factory DefaultFirmware Upgrade Administration Tab Firmware UpgradeInternet Connections Status Tab RouterRouter Status Local Network Status Status Tab Local NetworkWireless Status Status Tab Wireless NetworkNeed to set a static IP address on a PC Appendix a TroubleshootingCommon Problems and Solutions Wireless-N Gigabit Gaming Router Open a command prompt. For Windows 98SE and Me TCP Protocol To IP Address EnabledCan’t get the Internet game, server, or application to work Wireless-N Gigabit Gaming Router My DSL service’s PPPoE is always disconnecting To start over, I need to set the Router to factory defaultsNeed to upgrade the firmware Firmware upgrade failed, and/or the Power LED is flashingPower LED keeps flashing Does the Router support IPX or AppleTalk? Frequently Asked QuestionsWhere is the Router installed on the network? Is IPSec Pass-Through supported by the Router?How can I block corrupted FTP downloads? Is the Router cross-platform compatible? What is DMZ Hosting?What are the advanced features of the Router? Will the Router function in a Macintosh environment?What Ieee 802.11b features are supported? What is the Ieee 802.11g standard?What is the Ieee 802.11b standard? What Ieee 802.11g features are supported? What is Spread Spectrum? What is infrastructure mode? What is roaming? What is ISM band?How do I resolve issues with signal loss? What is DSSS? What is FHSS? And what are their differences?What is a MAC Address? How do I reset the Router?Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-N Gigabit Gaming Router Appendix C Upgrading Firmware Figure C-1 Firmware UpgradeNetwork Neighborhood/My Network Places Appendix D Windows HelpShared Resources Windows 2000 or XP Instructions For the Router’s Web-based Utility Wireless MAC FilterFigure E-3 MAC Address/Physical Address Appendix F Glossary Wireless-N Gigabit Gaming Router Wireless-N Gigabit Gaming Router Wireless-N Gigabit Gaming Router Wireless-N Gigabit Gaming Router Standards Appendix G SpecificationsModel Storage Humidity Operating TempStorage Temp Operating HumidityLimited Warranty Appendix H Warranty InformationFCC Statement Appendix I Regulatory InformationWireless-N Gigabit Gaming Router Wireless-N Gigabit Gaming Router Wireless-N Gigabit Gaming Router Wireless-N Gigabit Gaming Router Wireless-N Gigabit Gaming Router Appendix J Contact Information