Linksys WRT150N manual Appendix B Wireless Security

Page 70

Wireless-N Home Router

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

PSK.Pre-Shared Key (PSK) is the newest and best available standard in Wi-Fi security. PSK2 is the newer version of Wi-Fi Protected Access with stronger encryption than PSK. PSK and PSK2 gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. (AES is stronger than TKIP.)

Appendix B: Wireless Security

IMPORTANT: Always remember that each device in your wireless network MUST use the same security method and key, or else your wireless network will not function properly.

64

Security Threats Facing Wireless Networks

Image 70
Contents GHz Wireless- N Copyright and Trademarks How to Use This User GuideWord definition Table of Contents Common Problems and Solutions Frequently Asked Questions Appendix a TroubleshootingAppendix B Wireless Security Appendix C Upgrading Firmware Appendix D Windows HelpRouter’s Back Panel Router’s Front Panel26 Access Restrictions Tab Internet Access Policy Introduction WelcomeWhat’s in this User Guide? Wireless-N Home Router Ssid service set identifier your wireless network’s name Planning Your Wireless NetworkAd-Hoc versus Infrastructure Mode Network TopologyPlanning Your Wireless Network Network Layout Getting to Know the Wireless-N Home Router Back PanelFront Panel Top PanelConnecting the Wireless-N Home Router Hardware InstallationWireless Configuring the Wireless-N Home RouterSetup OverviewSecurity Access RestrictionsAdministration Applications & GamingInternet Setup How to Access the Web-based UtilitySetup Tab Basic Setup StatusStatic IP PPPoEPptp Telstra CableOptional Settings Packet a unit of data sent over a networkDhcp Server Setting Network SetupRouter IP Time Setting Dhcp ReservationDdns Service Setup Tab DdnsDynDNS.org 10 Setup Tab Ddns TZO.com TZO.comSetup Tab MAC Address Clone MAC Address CloneDynamic Routing Setup Tab Advanced RoutingAdvanced Routing Static Routing13 Routing Table Wireless Tab Basic Wireless Settings Basic Wireless SettingsPSK-Personal Wireless Tab Wireless SecurityWireless Security PSK2-PersonalPSK-Enterprise PSK2-EnterpriseRadius Access Restrictions Wireless Tab Wireless MAC FilterWireless MAC Filter MAC Address Filter ListWireless Tab Advanced Wireless Settings Advanced WirelessWireless-N Home Router Web Filter Security Tab FirewallInternet Filter FirewallSecurity Tab VPN Passthrough VPN PassthroughInternet Access Policy Access Restrictions Tab Internet Access PolicyTo create a policy 28 List of PCs Applications & Gaming Tab Single Port Forwarding Single Port ForwardingApplications & Gaming Tab Port Range Forwarding Port Range ForwardingApplications & Gaming Tab Port Range Triggering Port Range TriggeringApplications & Gaming Tab DMZ DMZInternet Access Priority QoS Quality of ServiceWireless Applications and Gaming Tab QoS35 QoS Applications Add a New Application Summary 39 QoS Voice DeviceWeb Access Administration Tab ManagementRouter Access Remote AccessBackup and Restore UPnPAdministration Tab Log LogAdministration Tab Diagnostics 43 Administration Tab DiagnosticsAdministration Tab Factory Defaults Factory DefaultsAdministration Tab Firmware Upgrade Upgrade FirmwareRouter Information Status Tab RouterInternet Connection Status Tab Local Network Local NetworkStatus Tab Wireless 51 Status Tab WirelessCommon Problems and Solutions Appendix a TroubleshootingNeed to set a static IP address on a PC Wireless-N Home Router Open a command prompt. For Windows 98SE and Me Protocol To IP Address Enabled Application NameApplication Name Start and End Port Can’t get the Internet game, server, or application to workWireless-N Home Router Firmware upgrade failed, and/or the Power LED is flashing To start over, I need to set the Router to factory defaultsNeed to upgrade the firmware My DSL service’s PPPoE is always disconnectingPower LED keeps flashing Is IPSec Pass-Through supported by the Router? Frequently Asked QuestionsWhere is the Router installed on the network? Does the Router support IPX or AppleTalk?How can I block corrupted FTP downloads? Will the Router function in a Macintosh environment? What is DMZ Hosting?What are the advanced features of the Router? Is the Router cross-platform compatible?What Ieee 802.11g features are supported? What is the Ieee 802.11g standard?What is the Ieee 802.11b standard? What Ieee 802.11b features are supported?What is ISM band? What is infrastructure mode?What is roaming? What is Spread Spectrum?How do I reset the Router? What is DSSS? What is FHSS? And what are their differences?What is a MAC Address? How do I resolve issues with signal loss?Security Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-N Home Router Figure C-1 Firmware Upgrade Appendix C Upgrading FirmwareShared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Figure E-1 IP Configuration Screen Windows 98SE or Me InstructionsWindows 2000 or XP Instructions For the Router’s Web-based UtilityAppendix F Glossary Wireless-N Home Router Wireless-N Home Router Wireless-N Home Router Wireless-N Home Router Model Appendix G SpecificationsLEDs Operating Humidity Operating TempStorage Temp Storage HumidityAppendix H Warranty Information Limited WarrantyAppendix I Regulatory Information FCC StatementWireless-N Home Router Wireless-N Home Router Wireless-N Home Router Wireless-N Home Router Wireless-G Home Router Need to contact Linksys? Appendix J Contact InformationInformation section in this Guide