Linksys WRT54GP2 manual Wireless-G Broadband Router with 2 Phone Ports

Page 89

Wireless-G Broadband Router with 2 Phone Ports

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: Pre-Shared Key and RADIUS. Pre-Shared Key gives you one encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers.

WPA Pre-Shared Key. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption keys.

IMPORTANT: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

Appendix B: Wireless Security

83

Security Threats Facing Wireless Networks

Image 89 Contents
Wireless- G Word definition How to Use this GuideCopyright and Trademarks Table of Contents Wireless-G Broadband Router with 2 Phone Ports Wireless Security Wireless Security WPAWireless Security WEP Wireless Network Access32 Administration Tab Log Welcome IntroductionWhat’s in this Guide? Introduction What’s in this Guide? Wireless-G Broadband Router with 2 Phone Ports Ad-Hoc versus Infrastructure Mode Planning Your Wireless NetworkSsid your wireless network’s name Network TopologyNetwork Layout Phone2 Back PanelFront Panel Getting to Know the Router Front Panel Wireless-G Broadband Router with 2 Phone Ports Overview Connecting the RouterConnect a PC Connection InstructionsConfiguring the Router Security SetupWireless Applications & Gaming AdministrationVoice Status How to Access the Web-based UtilityInternet Setup Setup Tab Basic SetupInternet Connection Type Obtain an IP automaticallyPPPoE Static IPPPPoE RAS for SingTelPptp Heart Beat Signal Heart Beat SignalOptional Settings Network SetupRouter IP Packet a unit of data sent over a networkNetwork Address Server Settings Dhcp Time Setting Setup Tab DdnsTZO.com DynDNS.orgMAC Clone Setup Tab MAC Address Clone12 Setup Tab Advanced Routing Setup Tab Advanced Routing13 Routing Table Entry List Wireless Tab Basic Wireless Settings 15 Wireless Tab Wireless Security WPA Pre-Shared Key Wireless Tab Wireless Security16 Wireless Tab Wireless Security WPA Radius 18 Wireless Tab Wireless Network Access Wireless Tab Wireless Network Access20 Advanced Wireless Settings Wireless Tab Advanced Wireless SettingsWireless-G Broadband Router with 2 Phone Ports Filter IP Address Range Security Tab FilterFilter Port Range Filter MAC AddressInternet requests Block WAN RequestsVPN Passthrough Security Tab VPN PassthroughApplications & Gaming Tab Port Range Forwarding Voice TabPort Range Forwarding Port Range26 Applications & Gaming Tab Port Triggering Forwarded Range Applications & Gaming Tab UPnP ForwardingUPnP Forwarding Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports DMZ Applications & Gaming Tab DMZApplication-based QoS Applications & Gaming Tab QoSSpecific Port# fields Port-based QoSVoice QoS Router Password Administration Tab ManagementLocal Router Access Remote Router AccessUPnP Backup and RestoreLog Administration Tab LogAdministration Tab Firmware Upgrade Administration Tab Factory DefaultsRuns a networking device Firmware with a newer versionInformation Status Tab VoiceLine1 Status Line2 Status38 Status Tab Router Status Tab RouterLocal Network Status Tab Local NetworkStatus Tab Wireless Common Problems and Solutions Appendix a TroubleshootingNeed to set a static IP address on a PC For Windows 98 and MillenniumFor Windows XP For WindowsWant to test my Internet connection For Windows XP Configuring the Router for details Am not able to access the Router’s Web-based Utility Setup Need to set up a server behind my Router TCP Application Start and End Protocol IP Address EnabledCan’t get the Internet game, server, or application to work Wireless-G Broadband Router with 2 Phone Ports My DSL service’s PPPoE is always disconnecting To start over, I need to set the Router to factory defaultFor Microsoft Internet Explorer 5.0 or higher For Netscape 4.7 or higherWireless-G Broadband Router with 2 Phone Ports Need to use port triggering How do I make a phone call? Frequently Asked QuestionsCan I make calls if my Internet connection is down? Can I make calls while I’m browsing the Internet?Does the Router support IPX or AppleTalk? Where is the Router installed on the network?Is IPSec Passthrough supported by the Router? How can I block corrupted FTP downloads? Wireless-G Broadband Router with 2 Phone Ports Will the Router function in a Macintosh environment? If all else fails in the installation, what can I do?What is DMZ Hosting? How many ports can be simultaneously forwarded? Is the Router cross-platform compatible?Which modems are compatible with the Router? How can I check whether I have static or Dhcp IP addresses?What Ieee 802.11b features are supported? What is the Ieee 802.11b standard?What is the Ieee 802.11g standard? What is roaming? What is ad-hoc mode?What is infrastructure mode? What is Spread Spectrum? What is ISM band?What is WEP? What is DSSS? What is FHSS? And what are their differences?What is WPA? What is a MAC Address?Have excellent signal strength, but I cannot see my network How do I resolve issues with signal loss? Wireless-G Broadband Router with 2 Phone Ports Security Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Windows 98 or Me Instructions Figure C-1 IP Configuration ScreenFor the Router’s Web-based Utility Windows 2000 or XP InstructionsNetwork Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix D Windows Help Appendix E Glossary Appendix E Glossary Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Model Appendix F SpecificationsVoice Protocol UPnP able/cert CertifiedStorage Humidity Dimensions 32 x 1.89 x H x DWarranty Year Limited Limited Warranty Appendix G Warranty InformationAppendix G Warranty Information FCC Statement Appendix H Regulatory InformationSafety Notices Appendix I Contact Information Appendix I Contact Information
Related manuals
Manual 110 pages 17.19 Kb