Linksys WRT54G3G-VN manual Appendix B Wireless Security, Security Precautions

Page 71

Wireless-G Router for Mobile Broadband

Appendix B: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

IMPORTANT: Linksys strongly recommends that you enable wireless security on your wireless network. Otherwise, unauthorized users may be able to access the Internet using your service and incur additional charges. You are liable for any and all additional charges from your service provider.

Security Precautions

The following is a complete list of security precautions to take (at least steps 1 through 5 should be followed):

1.Change the default SSID.

2.Disable SSID Broadcast.

3.Change the default password for the Administrator account.

4.Enable MAC Address Filtering.

5.Change the SSID periodically.

6.Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce your network performance.

7.Change the WEP encryption keys periodically.

For information on implementing these security features, refer to “Chapter 8: Configuring the Wireless-G Router for Mobile Broadband.”

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only

Appendix B: Wireless Security

64

Security Precautions

Image 71
Contents 802 GHz .11g Wireless- G Word definition How to Use This User GuideCopyright and Trademarks Table of Contents Appendix C Upgrading Firmware Appendix D Windows Help Appendix a TroubleshootingAppendix B Wireless Security Common Problems and Solutions Frequently Asked QuestionsRouter’s Ports List of Figures17 Setup Tab Advanced Routing Router 51 Status Tab Wireless Welcome IntroductionWhat’s in this User Guide? Wireless-G Router for Mobile Broadband Network Topology Planning Your Wireless NetworkAd-Hoc versus Infrastructure Mode Ssid service set identifier your wireless network’s namePlanning Your Wireless Network Network Layout Router’s Ports Getting to Know the Wireless-G Router for Mobile BroadbandRouter’s LEDs are located on the Router’s other side panel Router’s LEDsRouter’s Data Card Slot Overview Connecting the Wireless-G Router for Mobile BroadbandConnect Your Computer Hardware Installation for Connection to Your Broadband Modem Connect the Power Diagram for Connection to Another Router Hardware Installation for Connection to Another RouterConnect Your Computer Stand Option Placement Options11 Measurement between Wall-Mount Slots Wall-Mount OptionPassword Screen Configuring the Wireless-G Router for Mobile BroadbandStatus Setup Tab Basic SetupMobile Network Setup Internet SetupStatic IP Connection Type L2TP Connection Type Optional SettingsRouter IP Network SetupNetwork Address Server Settings Dhcp 11 Time Setting Time SettingData Card Status Setup Tab Mobile NetworkMobile Network Connection Mode Mobile Network StatusTZO.com Setup Tab DdnsDynDNS.org MAC Clone Setup Tab MAC Address CloneStatic Routing Setup Tab Advanced RoutingAdvanced Routing Dynamic RoutingWireless Network Wireless Tab Basic Wireless SettingsWireless Security Wireless Tab Wireless SecurityAES 25 Wireless Tab Wireless Security Radius Wireless MAC Filter Wireless Tab Wireless MAC FilterAdvanced Wireless Wireless Tab Advanced Wireless SettingsWireless-G Router for Mobile Broadband Block WAN Requests Security Tab FirewallFirewall Security Tab VPN Passthrough Access Restrictions Tab Internet AccessInternet Access To create an Internet Access policy33 Internet Policy Summary Port Range Forward Applications and Gaming Tab Port Range ForwardForwarded Range Applications & Gaming Tab Port TriggeringPort Triggering Triggered RangeDevice Priority Wired QoSApplications and Gaming Tab DMZ Applications and Gaming Tab QoSApplication Priority Wireless QoSEthernet Port Priority UPnP Administration Tab ManagementRouter Password Log Administration Tab LogTraceroute Test Administration Tab DiagnosticsPing Test Administration Tab Config Management Administration Tab Factory DefaultsAdministration Tab Firmware Upgrade 48 Status Tab Mobile Network Status Tab Mobile NetworkInternet Status Tab RouterRouter Information Local Network Status Tab Local NetworkWireless Status Tab WirelessNeed to set a static IP address on a PC Appendix a TroubleshootingCommon Problems and Solutions Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband TCP Application Start and End Protocol IP Address EnabledCan’t get the Internet game, server, or application to work My DSL service’s PPPoE is always disconnecting To start over, I need to set the Router to factory defaultNeed to upgrade the firmware Power LED keeps flashing Does the Router support IPX or AppleTalk? Frequently Asked QuestionsWhere is the Router installed on the network? Is IPSec Pass-Through supported by the Router?How can I avoid corrupted FTP downloads? If all else fails in the installation, what can I do?How will I be notified of new Router firmware upgrades? Is the Router cross-platform compatible? What is DMZ Hosting?What are the advanced features of the Router? Will the Router function in a Macintosh environment?What Ieee 802.11b features are supported? What is the Ieee 802.11g standard?What is the Ieee 802.11b standard? What Ieee 802.11g features are supported?What is Spread Spectrum? What is infrastructure mode?What is roaming? What is ISM band?How do I reset the Router? What is DSSS? What is FHSS? And what are their differences?What is WEP? What is a MAC Address?How do I connect to the mobile network? What do the indicator LEDs signify on the Router?Whom should I call if there is a question or problem? How do I know which mobile network I am using?Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-G Router for Mobile Broadband Appendix C Upgrading Firmware Figure C-1 Upgrade FirmwareNetwork Neighborhood/My Network Places Appendix D Windows HelpShared Resources For the Router’s Web-based Utility Windows 2000 or XP InstructionsFigure E-4 MAC Address Filter List Appendix F Glossary Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Appendix G Specifications FCC, IC-03, CE, Wi-Fi 802.11b, 802.11g, WPA Appendix H Warranty Information Appendix I Regulatory Information Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband