Linksys WRT54G3G-VN manual Wireless-G Router for Mobile Broadband

Page 73

Wireless-G Router for Mobile Broadband

provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. (AES is stronger than TKIP.) WPA2 uses TKIP + AES for encryption.

WPA Enterprise and WPA2 Enterprise use a RADIUS (Remote Authentication Dial-In User Service) server for authentication. RADIUS uses a RADIUS server and WEP encryption.

WPA Personal. Select the type of algorithm, TKIP or AES, and enter a password in the Passphrase field of

8-63 characters. Enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption keys.

WPA2 Personal. WPA2 uses TKIP + AES, with dynamic encryption keys. Enter a Passphrase of 8-63 characters. Then enter a Group Key Renewal period, which instructs the Router or other device how often it should change the encryption keys.

WPA Enterprise. This method is WPA used in coordination with a RADIUS server. Enter the IP address and port number of the RADIUS server. Then enter the key shared between the Router and its RADIUS server. Then enter a Key Renewal Timeout period, which instructs the Router or other device how often it should change the encryption keys.

WPA2 Enterprise. This method is WPA2 used in coordination with a RADIUS server. Enter the IP address and port number of the RADIUS server. Then enter the key shared between the Router and its RADIUS server. Then enter a Key Renewal Timeout period, which instructs the Router or other device how often it should change the encryption keys.

RADIUS. This method is WEP used in coordination with a RADIUS server. Enter the IP address and port number of the RADIUS server. Then enter the key shared between the Gateway and its RADIUS server. Enter the WEP settings.

Implementing encryption may have a negative impact on your network’s performance, but if you are transmitting sensitive data over your network, encryption should be used.

These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology.

Appendix B: Wireless Security

66

Security Threats Facing Wireless Networks

Image 73
Contents 802 GHz .11g Wireless- G Copyright and Trademarks How to Use This User GuideWord definition Table of Contents Appendix B Wireless Security Appendix a TroubleshootingCommon Problems and Solutions Frequently Asked Questions Appendix C Upgrading Firmware Appendix D Windows HelpRouter’s Ports List of Figures17 Setup Tab Advanced Routing Router 51 Status Tab Wireless Welcome IntroductionWhat’s in this User Guide? Wireless-G Router for Mobile Broadband Ad-Hoc versus Infrastructure Mode Planning Your Wireless NetworkSsid service set identifier your wireless network’s name Network TopologyPlanning Your Wireless Network Network Layout Router’s Ports Getting to Know the Wireless-G Router for Mobile BroadbandRouter’s LEDs are located on the Router’s other side panel Router’s LEDsRouter’s Data Card Slot Overview Connecting the Wireless-G Router for Mobile BroadbandConnect Your Computer Hardware Installation for Connection to Your Broadband Modem Connect the Power Diagram for Connection to Another Router Hardware Installation for Connection to Another RouterConnect Your Computer Stand Option Placement Options11 Measurement between Wall-Mount Slots Wall-Mount OptionPassword Screen Configuring the Wireless-G Router for Mobile BroadbandMobile Network Setup Setup Tab Basic SetupInternet Setup StatusStatic IP Connection Type L2TP Connection Type Optional SettingsNetwork Address Server Settings Dhcp Network SetupRouter IP 11 Time Setting Time SettingMobile Network Connection Mode Setup Tab Mobile NetworkMobile Network Status Data Card StatusDynDNS.org Setup Tab DdnsTZO.com MAC Clone Setup Tab MAC Address CloneAdvanced Routing Setup Tab Advanced RoutingDynamic Routing Static RoutingWireless Network Wireless Tab Basic Wireless SettingsWireless Security Wireless Tab Wireless SecurityAES 25 Wireless Tab Wireless Security Radius Wireless MAC Filter Wireless Tab Wireless MAC FilterAdvanced Wireless Wireless Tab Advanced Wireless SettingsWireless-G Router for Mobile Broadband Firewall Security Tab FirewallBlock WAN Requests Internet Access Access Restrictions Tab Internet AccessTo create an Internet Access policy Security Tab VPN Passthrough33 Internet Policy Summary Port Range Forward Applications and Gaming Tab Port Range ForwardPort Triggering Applications & Gaming Tab Port TriggeringTriggered Range Forwarded RangeApplications and Gaming Tab DMZ Wired QoSApplications and Gaming Tab QoS Device PriorityEthernet Port Priority Wireless QoSApplication Priority Router Password Administration Tab ManagementUPnP Log Administration Tab LogPing Test Administration Tab DiagnosticsTraceroute Test Administration Tab Firmware Upgrade Administration Tab Factory DefaultsAdministration Tab Config Management 48 Status Tab Mobile Network Status Tab Mobile NetworkRouter Information Status Tab RouterInternet Local Network Status Tab Local NetworkWireless Status Tab WirelessCommon Problems and Solutions Appendix a TroubleshootingNeed to set a static IP address on a PC Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband TCP Application Start and End Protocol IP Address EnabledCan’t get the Internet game, server, or application to work Need to upgrade the firmware To start over, I need to set the Router to factory defaultMy DSL service’s PPPoE is always disconnecting Power LED keeps flashing Where is the Router installed on the network? Frequently Asked QuestionsIs IPSec Pass-Through supported by the Router? Does the Router support IPX or AppleTalk?How will I be notified of new Router firmware upgrades? If all else fails in the installation, what can I do?How can I avoid corrupted FTP downloads? What are the advanced features of the Router? What is DMZ Hosting?Will the Router function in a Macintosh environment? Is the Router cross-platform compatible?What is the Ieee 802.11b standard? What is the Ieee 802.11g standard?What Ieee 802.11g features are supported? What Ieee 802.11b features are supported?What is roaming? What is infrastructure mode?What is ISM band? What is Spread Spectrum?What is WEP? What is DSSS? What is FHSS? And what are their differences?What is a MAC Address? How do I reset the Router?How do I connect to the mobile network? What do the indicator LEDs signify on the Router?Whom should I call if there is a question or problem? How do I know which mobile network I am using?Security Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Router for Mobile Broadband Appendix C Upgrading Firmware Figure C-1 Upgrade FirmwareShared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places For the Router’s Web-based Utility Windows 2000 or XP InstructionsFigure E-4 MAC Address Filter List Appendix F Glossary Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Appendix G Specifications FCC, IC-03, CE, Wi-Fi 802.11b, 802.11g, WPA Appendix H Warranty Information Appendix I Regulatory Information Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband Wireless-G Router for Mobile Broadband