Linksys WRT54G3G-VN manual Appendix B Wireless Security

Page 72

Wireless-G Router for Mobile Broadband

person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. WPA2 is the newer version of Wi-Fi Protected Access with stronger encryption than WPA. WPA gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which incorporates Message Integrity Code (MIC) to

Appendix B: Wireless Security

IMPORTANT: Always remember that each device in your wireless network MUST use the same security method and passphrase or key; otherwise, your wireless network will not function properly.

65

Security Threats Facing Wireless Networks

Image 72
Contents 802 GHz .11g Wireless- G How to Use This User Guide Copyright and TrademarksWord definition Table of Contents Appendix a Troubleshooting Appendix B Wireless SecurityCommon Problems and Solutions Frequently Asked Questions Appendix C Upgrading Firmware Appendix D Windows HelpList of Figures Router’s Ports17 Setup Tab Advanced Routing Router 51 Status Tab Wireless Introduction WelcomeWhat’s in this User Guide? Wireless-G Router for Mobile Broadband Planning Your Wireless Network Ad-Hoc versus Infrastructure ModeSsid service set identifier your wireless network’s name Network TopologyPlanning Your Wireless Network Network Layout Getting to Know the Wireless-G Router for Mobile Broadband Router’s PortsRouter’s LEDs Router’s LEDs are located on the Router’s other side panelRouter’s Data Card Slot Connecting the Wireless-G Router for Mobile Broadband OverviewConnect Your Computer Hardware Installation for Connection to Your Broadband Modem Connect the Power Hardware Installation for Connection to Another Router Diagram for Connection to Another RouterConnect Your Computer Placement Options Stand OptionWall-Mount Option 11 Measurement between Wall-Mount SlotsConfiguring the Wireless-G Router for Mobile Broadband Password ScreenSetup Tab Basic Setup Mobile Network SetupInternet Setup StatusStatic IP Connection Type Optional Settings L2TP Connection TypeNetwork Setup Network Address Server Settings DhcpRouter IP Time Setting 11 Time SettingSetup Tab Mobile Network Mobile Network Connection ModeMobile Network Status Data Card StatusSetup Tab Ddns DynDNS.orgTZO.com Setup Tab MAC Address Clone MAC CloneSetup Tab Advanced Routing Advanced RoutingDynamic Routing Static RoutingWireless Tab Basic Wireless Settings Wireless NetworkWireless Tab Wireless Security Wireless SecurityAES 25 Wireless Tab Wireless Security Radius Wireless Tab Wireless MAC Filter Wireless MAC FilterWireless Tab Advanced Wireless Settings Advanced WirelessWireless-G Router for Mobile Broadband Security Tab Firewall FirewallBlock WAN Requests Access Restrictions Tab Internet Access Internet AccessTo create an Internet Access policy Security Tab VPN Passthrough33 Internet Policy Summary Applications and Gaming Tab Port Range Forward Port Range ForwardApplications & Gaming Tab Port Triggering Port TriggeringTriggered Range Forwarded RangeWired QoS Applications and Gaming Tab DMZApplications and Gaming Tab QoS Device PriorityWireless QoS Ethernet Port PriorityApplication Priority Administration Tab Management Router PasswordUPnP Administration Tab Log LogAdministration Tab Diagnostics Ping TestTraceroute Test Administration Tab Factory Defaults Administration Tab Firmware UpgradeAdministration Tab Config Management Status Tab Mobile Network 48 Status Tab Mobile NetworkStatus Tab Router Router InformationInternet Status Tab Local Network Local NetworkStatus Tab Wireless WirelessAppendix a Troubleshooting Common Problems and SolutionsNeed to set a static IP address on a PC Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Application Start and End Protocol IP Address Enabled TCPCan’t get the Internet game, server, or application to work To start over, I need to set the Router to factory default Need to upgrade the firmwareMy DSL service’s PPPoE is always disconnecting Power LED keeps flashing Frequently Asked Questions Where is the Router installed on the network?Is IPSec Pass-Through supported by the Router? Does the Router support IPX or AppleTalk?If all else fails in the installation, what can I do? How will I be notified of new Router firmware upgrades?How can I avoid corrupted FTP downloads? What is DMZ Hosting? What are the advanced features of the Router?Will the Router function in a Macintosh environment? Is the Router cross-platform compatible?What is the Ieee 802.11g standard? What is the Ieee 802.11b standard?What Ieee 802.11g features are supported? What Ieee 802.11b features are supported?What is infrastructure mode? What is roaming?What is ISM band? What is Spread Spectrum?What is DSSS? What is FHSS? And what are their differences? What is WEP?What is a MAC Address? How do I reset the Router?What do the indicator LEDs signify on the Router? How do I connect to the mobile network?How do I know which mobile network I am using? Whom should I call if there is a question or problem?Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Router for Mobile Broadband Figure C-1 Upgrade Firmware Appendix C Upgrading FirmwareAppendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Windows 2000 or XP Instructions For the Router’s Web-based UtilityFigure E-4 MAC Address Filter List Appendix F Glossary Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Appendix G Specifications FCC, IC-03, CE, Wi-Fi 802.11b, 802.11g, WPA Appendix H Warranty Information Appendix I Regulatory Information Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband