Linksys WRT350N manual Appendix B Wireless Security

Page 77

Wireless-N Gigabit Router with Storage Link

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

PSK. PSK is stronger than WEP encryption, and PSK2 has stronger encryption than PSK. PSK and PSK2 gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. (AES is stronger than TKIP.)

PSK-Enterprise and PSK2-Enterprise use a RADIUS (Remote Authentication Dial-In User Service) server for authentication. RADIUS uses a RADIUS server and WEP encryption.

Appendix B: Wireless Security

IMPORTANT: Always remember that each device in your wireless network MUST use the same security method and key, or else your wireless network will not function properly.

70

Security Threats Facing Wireless Networks

Image 77
Contents Wireless- N Word definition How to Use This User GuideCopyright and Trademarks Table of Contents Appendix B Wireless Security Appendix a TroubleshootingCommon Problems and Solutions Frequently Asked Questions Appendix C Upgrading Firmware Appendix D Windows HelpRouter’s Back Panel List of Figures25 VPN Passthrough 59 Administration Tab Firmware Upgrade Welcome IntroductionWhat’s in this User Guide? Wireless-N Gigabit Router with Storage Link Ad-Hoc versus Infrastructure Mode Planning Your Wireless NetworkSsid service set identifier your wireless network’s name Network TopologyNetwork Layout Internet Back PanelTop Panel Front PanelHardware Installation Connecting the Wireless-N Gigabit Router with Storage LinkOverview Configuring the Wireless-N Gigabit Router with Storage LinkSetup Access Restrictions WirelessSecurity StorageSetup Tab Basic Setup How to Access the Web-based UtilityAdministration StatusAutomatic Configuration Dhcp Internet SetupInternet Connection Type Static IPPptp Packet a unit of data sent over a network Optional SettingsTelstra Cable Router IP Network SetupDhcp Server Setting Dhcp Reservation Time SettingDynDNS.org Setup Tab DdnsDdns Service TZO.com 10 Setup Tab TZO.comMAC Address Clone Setup Tab MAC Address CloneAdvanced Routing Setup Tab Advanced RoutingDynamic Routing Static Routing13 Routing Table Basic Wireless Settings Wireless Tab Basic Wireless SettingsWireless Security Wireless Tab Wireless SecurityPSK-Personal PSK2-PersonalPSK2-Enterprise PSK-EnterpriseRadius Wireless MAC Filter Wireless Tab Wireless MAC FilterAccess Restrictions MAC Address Filter ListAdvanced Wireless Wireless Tab Advanced Wireless SettingsWireless-N Gigabit Router with Storage Link Internet Filter Security Tab FirewallWeb Filter FirewallVPN Passthrough Security Tab VPN PassthroughDisk Management Storage Tab DiskDisk Detail Erase DiskShare Management Storage Tab ShareShares Create ShareBasic Storage Tab AdministrationUser Management Group Management33 User Properties Storage Tab Media Server SetupUPnP Media Server DatabaseShare AccessFTP Server To create a policy Access Restrictions Tab Internet Access PolicyInternet Access Policy 40 List of PCs Single Port Forwarding Applications & Gaming Tab Single Port ForwardingPort Range Forwarding Applications & Gaming Tab Port Range ForwardingPort Range Triggering Applications & Gaming Tab Port Range TriggeringDMZ Applications & Gaming Tab DMZWireless QoS Quality of ServiceInternet Access Priority Applications and Gaming Tab QoS47 QoS Applications Add a New Application 51 QoS Voice Device SummaryRouter Access Administration Tab ManagementWeb Access Remote AccessUPnP Backup and RestoreLog Administration Tab Log55 Administration Tab Diagnostics Administration Tab DiagnosticsFactory Defaults Administration Tab Factory DefaultsUpgrade Firmware Administration Tab Firmware UpgradeInternet Connection Status Tab RouterRouter Information Local Network Status Tab Local Network63 Status Tab Wireless Network Status Tab WirelessNeed to set a static IP address on a PC Appendix a TroubleshootingCommon Problems and Solutions Wireless-N Gigabit Router with Storage Link Open a command prompt. For Windows 98SE and Me Application Name Protocol To IP Address EnabledCan’t get the Internet game, server, or application to work Application Name Start and End PortWireless-N Gigabit Router with Storage Link Need to upgrade the firmware To start over, I need to set the Router to factory defaultsFirmware upgrade failed, and/or the Power LED is flashing My DSL service’s PPPoE is always disconnectingPower LED keeps flashing Where is the Router installed on the network? Frequently Asked QuestionsIs IPSec Pass-Through supported by the Router? Does the Router support IPX or AppleTalk?How can I block corrupted FTP downloads? What are the advanced features of the Router? What is DMZ Hosting?Will the Router function in a Macintosh environment? Is the Router cross-platform compatible?What is the Ieee 802.11b standard? What is the Ieee 802.11g standard?What Ieee 802.11g features are supported? What Ieee 802.11b features are supported?What is roaming? What is infrastructure mode?What is ISM band? What is Spread Spectrum?What is a MAC Address? What is DSSS? What is FHSS? And what are their differences?How do I reset the Router? How do I resolve issues with signal loss?Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-N Gigabit Router with Storage Link Appendix C Upgrading Firmware Figure C-1 Firmware UpgradeNetwork Neighborhood/My Network Places Appendix D Windows HelpShared Resources Windows 98SE or Me Instructions Figure E-1 IP Configuration ScreenFor the Router’s Web-based Utility Windows 2000 or XP InstructionsAppendix F Glossary Wireless-N Gigabit Router with Storage Link Wireless-N Gigabit Router with Storage Link Wireless-N Gigabit Router with Storage Link Wireless-N Gigabit Router with Storage Link Model Appendix G SpecificationsStorage Temp Operating TempOperating Humidity Storage HumidityLimited Warranty Appendix H Warranty InformationFCC Statement Appendix I Regulatory InformationWireless-N Gigabit Router with Storage Link Wireless-N Gigabit Router with Storage Link Wireless-N Gigabit Router with Storage Link Wireless-N Gigabit Router with Storage Link Wireless-N Gigabit Router with Storage Link Information section in this Guide Appendix J Contact InformationNeed to contact Linksys?