Linksys WRT54GP2 manual Wireless-G Broadband Router with 2 Phone Ports

Page 87

Wireless-G Broadband Router with 2 Phone Ports

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: Pre-Shared Key and RADIUS. Pre-Shared Key gives you one encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers.

WPA Pre-Shared Key. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption keys.

IMPORTANT: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

Appendix B: Wireless Security

79

Security Threats Facing Wireless Networks

Image 87 Contents
Wireless- G Page How to Use this Guide Copyright and TrademarksWord definition Wireless-G Broadband Router with 2 Phone Ports Table of Contents Vonage Linksys Appendix C Finding the MAC AddressWireless Security WEP Wireless Network AccessList of Figures 39 Status Tab Local Network Welcome IntroductionWhat’s in this Guide? Introduction What’s in this Guide? Wireless-G Broadband Router with 2 Phone Ports Network Topology Planning Your Wireless NetworkAd-Hoc versus Infrastructure Mode Ssid your wireless network’s nameNetwork Layout Back Panel Getting to Know the RouterWlan Front PanelOverview Connecting the RouterConnect a PC Connection InstructionsConfiguring the Router Setup WirelessSecurity Administration VoiceApplications & Gaming Status How to Access the Web-based UtilityObtain an IP automatically Setup Tab Basic SetupInternet Setup Internet Connection TypeStatic IP PPPoE Pptp Heart Beat Signal Packet a unit of data sent over a network Network SetupOptional Settings Router IPNetwork Address Server Settings Dhcp Time Setting Setup Tab DdnsTZO.com DynDNS.orgMAC Clone Setup Tab MAC Address CloneAdvanced Routing Setup Tab Advanced Routing13 Routing Table Entry List Wireless Tab Basic Wireless Settings 15 Wireless Tab Wireless Security WPA Pre-Shared Key Wireless Tab Wireless Security16 Wireless Tab Wireless Security WPA Radius 18 Wireless Tab Wireless Network Access Wireless Tab Wireless Network Access20 Advanced Wireless Settings Wireless Tab Advanced Wireless SettingsWireless-G Broadband Router with 2 Phone Ports Filter MAC Address Security Tab FilterFilter IP Address Range Filter Port RangeInternet requests Block WAN RequestsVPN Passthrough Security Tab VPN PassthroughPort Range Voice TabApplications & Gaming Tab Port Range Forwarding Port Range Forwarding26 Applications & Gaming Tab Port Triggering Applications & Gaming Tab UPnP Forwarding UPnP ForwardingForwarded Range Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports DMZ Applications & Gaming Tab DMZApplication-based QoS Applications & Gaming Tab QoSSpecific Port# fields Port-based QoSVoice QoS Remote Router Access Administration Tab ManagementRouter Password Local Router AccessUPnP Backup and RestoreLog Administration Tab LogFirmware with a newer version Administration Tab Factory DefaultsAdministration Tab Firmware Upgrade Runs a networking deviceLine2 Status Status Tab VoiceInformation Line1 Status38 Status Tab Router Status Tab RouterLocal Network Status Tab Local NetworkStatus Tab Wireless Common Problems and Solutions Appendix a TroubleshootingNeed to set a static IP address on a PC For Windows 98 and MillenniumFor Windows XP For WindowsWant to test my Internet connection For Windows XP Wireless-G Broadband Router with 2 Phone Ports Am not able to access the Router’s Web-based Utility Setup Need to set up a server behind my Router TCP Application Start and End Protocol IP Address EnabledCan’t get the Internet game, server, or application to work Appendix a Troubleshooting Common Problems and Solutions For Netscape 4.7 or higher To start over, I need to set the Router to factory defaultMy DSL service’s PPPoE is always disconnecting For Microsoft Internet Explorer 5.0 or higherWireless-G Broadband Router with 2 Phone Ports Go through this checklist until your problem is solved Frequently Asked Questions What is Network Address Translation and what is it used for? How can I block corrupted FTP downloads? If all else fails in the installation, what can I do? What is DMZ Hosting?Will the Router function in a Macintosh environment? How can I check whether I have static or Dhcp IP addresses? Is the Router cross-platform compatible?How many ports can be simultaneously forwarded? Which modems are compatible with the Router?What is the Ieee 802.11b standard? What is the Ieee 802.11g standard?What Ieee 802.11b features are supported? What is roaming? What Ieee 802.11g features are supported?What is ad-hoc mode? What is infrastructure mode?What is Spread Spectrum? What is ISM band?What is a MAC Address? What is DSSS? What is FHSS? And what are their differences?What is WEP? What is WPA? How many channels/frequencies are available with the Router? Have excellent signal strength, but I cannot see my networkSecurity Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Windows 98 or Me Instructions Figure C-1 IP Configuration ScreenFor the Router’s Web-based Utility Windows 2000 or XP InstructionsAppendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix D Windows Help Appendix E Glossary Appendix E Glossary Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports UPnP able/cert Certified Appendix F SpecificationsModel Voice ProtocolDimensions 32 x 1.89 x H x D Limited Warranty Appendix G Warranty InformationAppendix G Warranty Information FCC Statement Appendix H Regulatory InformationSafety Notices Hour 1-VONAGE-HELP VonageLinksys Need to contact Vonage?Linksys
Related manuals
Manual 112 pages 50.53 Kb