Linksys WRT54GP2A-AT manual Appendix B Wireless Security

Page 69

Wireless-G Broadband Router with 2 Phone Ports

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: Pre-Shared Key and RADIUS. Pre-Shared Key gives you one encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers.

Appendix B: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

60

Security Threats Facing Wireless Networks

Image 69
Contents 802 GHz .11g Wireless- G How to Use this Guide Copyright and TrademarksWord definition Table of Contents Appendix a Troubleshooting Signing up for AT&T CallVantagesm ServiceAppendix B Wireless Security Appendix C Windows HelpBack Panel List of Figures18 Wireless Tab Advanced Wireless Settings Welcome IntroductionWhat’s in this Guide? Wireless-G Broadband Router with 2 Phone Ports Ad-Hoc versus Infrastructure Mode Planning Your Wireless NetworkSsid your wireless network’s name Network TopologyNetwork Layout Phone2 Getting to Know the RouterWlan Connecting the Router Connecting the Router to Your Broadband ModemOverview Wired Router Connecting One Router to AnotherConnect the Other Router Configuring the Router SetupWireless Administration Access RestrictionsSecurity Applications & GamingSetup Tab Basic Setup How to Access the Web-based UtilityInternet Setup StatusPPPoE Static IPPacket a unit of data sent over a network Optional SettingsNetwork Setup Network Address Server Settings DhcpRouter IP Time Setting Setup Tab Ddns DynDNS.orgTZO.com MAC Clone Setup Tab MAC Address Clone10 Wireless Tab Basic Wireless Settings Wireless Tab Basic Wireless SettingsWPA Radius Wireless Tab Wireless SecurityRadius 15 Wireless Tab Wireless MAC Filter Wireless Tab Wireless MAC FilterWireless Tab Advanced Wireless Settings Firewall Security Tab FirewallAdditional Filters Block WAN RequestsVPN Passthrough Security Tab VPNAccess Restrictions Tab Internet Access Internet AccessTo create an Internet Access Policy 23 List of PCs Applications & Gaming Tab Port Range Forward Port Range ForwardPort Range Port Trigger Applications & Gaming Tab Port TriggerTriggered Range Forwarded RangeUPnP Forward Applications & Gaming Tab UPnP ForwardBroadband Router with 2 Phone Ports DMZ Applications & Gaming Tab DMZRouter Password Administration Tab ManagementLocal Router Access Remote Router AccessUPnP SnmpLog Administration Tab LogPing Test Administration Tab DiagnosticsTraceroute Test Ping ParametersFactory Defaults Administration Tab Factory DefaultsAdministration Tab Reboot Administration Tab Backup and RestoreBackup and Restore RebootStatus Tab Router Configuration TypeRouter Information InternetLocal Network Status Tab Local Network39 Status Tab Wireless Status Tab WirelessStatus Tab Voice Auto Config StatusUser1 Status User2 StatusInstructions Signing up for AT&T CallVantagesm ServiceCommon Problems and Solutions Appendix a TroubleshootingNeed to set a static IP address on a PC For Windows 98 and MillenniumFor Windows XP For WindowsFor Windows 98 and Millennium Wireless-G Broadband Router with 2 Phone Ports Need to set up a server behind my Router Am not able to access the Router’s Web-based Utility SetupTCP Application Start and End Protocol IP Address EnableCan’t get the Internet game, server, or application to work My DSL service’s PPPoE is always disconnecting To start over, I need to set the Router to factory defaultFor Microsoft Internet Explorer 5.0 or higher For Netscape 4.7 or higherNeed to use port triggering Frequently Asked Questions Can I make calls if my Internet connection is down?Can I make calls while I’m browsing the Internet? Where is the Router installed on the network? Is IPSec Passthrough supported by the Router?Does the Router support IPX or AppleTalk? If all else fails in the installation, what can I do? How can I block corrupted FTP downloads?Will the Router function in a Macintosh environment? What is the Ieee 802.11b standard? What is DMZ Hosting?Is the Router cross-platform compatible? How many ports can be simultaneously forwarded?What Ieee 802.11b features are supported? What is the Ieee 802.11g standard?What Ieee 802.11g features are supported? What is ad-hoc mode?What is ISM band? What is Spread Spectrum?What is DSSS? What is FHSS? And what are their differences? What is WPA? What is WEP?What is a MAC Address? How do I reset the Router?Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Broadband Router with 2 Phone Ports Appendix C Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Windows 2000 or XP Instructions Windows 98 or Me InstructionsFigure D-3 MAC Address/Physical Address For the Router’s Web-based UtilityAppendix E Glossary Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Wireless-G Broadband Router with 2 Phone Ports Button Reset Cabling Type Appendix F SpecificationsModel StandardsUnit Weight 19.29 oz .55 kg Power 12 V, 1 a Certifications Dimensions 32 x 2.48 x H x DRinger Equivalence Number Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage TempLimited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationSafety Notices Linksys Appendix I Contact InformationAfter you log in, click Help. Then click Email AN Agent Need to contact Linksys?