Linksys WRH54G manual Appendix B Wireless Security

Page 69

Wireless-G Home Router

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. WPA is stronger than WEP encryption, and WPA2 has stronger encryption than WPA. WPA and WPA2 give you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. (AES is stronger than TKIP.)

Appendix B: Wireless Security

IMPORTANT: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

62

Security Threats Facing Wireless Networks

Image 69
Contents Wireless- G Word definition Copyright and TrademarksTable of Contents Appendix a Troubleshooting Appendix B Wireless SecurityAppendix C Upgrading Firmware Appendix D Windows Help Router’s Back Panel List of Figures23 Wireless Tab Wireless Security Radius Figure E-1 IP Configuration Screen Welcome IntroductionWhat’s in this User Guide? Wireless-G Home Router Ad-Hoc versus Infrastructure Mode Planning Your Wireless NetworkSsid service set identifier your wireless network’s name Network TopologyPlanning Your Wireless Network Network Layout Back Panel Getting to Know the Wireless-G Home RouterRouter’s LEDs are located on the front panel Front PanelOverview Connecting the Wireless-G Home RouterConnecting Your Network Devices Connecting Another Router Hardware Installation for Connection to Another RouterConnecting Your Network Devices Welcome Screen Configuring the Wireless-G Home RouterInternet Setup Setup Tab Basic SetupPPPoE Connection Type Optional Settings Network Setup Time Setting Ddns Setup Tab DdnsTZO.com Setup Tab MAC Address Clone15 Setup Tab Advanced Routing Router Setup Tab Advanced RoutingWireless Tab Basic Wireless Settings Setup Tab WAN Port Configure19 Wireless Tab Wireless Security WPA Personal Wireless Tab Wireless Security22 Wireless Tab Wireless Security WPA2 Enterprise 23 Wireless Tab Wireless Security Radius 25 Wireless Tab Wireless MAC Filter Wireless Tab MAC FilteringSeverely decrease performance Wireless Tab Advanced Wireless SettingsWireless-G Home Router Additional Filters Security Tab FirewallSecurity Tab ARP Security Tab VPN Passthrough31 Access Restrictions Tab Internet Access Access Restrictions Tab Internet Access34 Port Services 35 Single Port Forward Applications and Gaming Tab Single Port ForwardWireless-G Home Router 36 Applications and Gaming Tab Port Range Forward Applications and Gaming Tab Port Range ForwardTriggered Range Applications & Gaming Tab Port Triggering38 Applications and Gaming Tab UPnP Applications and Gaming Tab UPnP39 Applications and Gaming Tab DMZ Applications and Gaming Tab DMZAdministration Tab Log Administration Tab Management43 Administration Tab Diagnostics Administration Tab Diagnostics45 The Traceroute Test Administration Tab Factory Defaults Administration Tab Firmware UpgradeAdministration Tab Config Management Status Tab Router Administration Tab Reboot52 Status Tab Local Network Status Tab Local Network54 Traffic Statistics Status Tab Traffic Statistics55 Status Tab Wireless Status Tab WirelessAppendix a Troubleshooting Common Problems and SolutionsNeed to set a static IP address on a PC Wireless-G Home Router Open a command prompt. For Windows 98SE and Me Application Start and End Protocol IP Address Enabled Can’t get the Internet game, server, or application to work Wireless-G Home Router Need to upgrade the firmware To start over, I need to set the Router to factory defaultFirmware upgrade failed, and/or the Power LED is flashing My DSL service’s PPPoE is always disconnectingPower LED keeps flashing Where is my SecureEasySetup button? Frequently Asked QuestionsWhere is the Router installed on the network? Is IPSec Pass-Through supported by the Router?Does the Router support ICQ send file? What is Network Address Translation and what is it used for?How can I block corrupted FTP downloads? What are the advanced features of the Router? What is DMZ Hosting?What is the Ieee 802.11g standard? Is the Router cross-platform compatible?What Ieee 802.11g features are supported? What is the Ieee 802.11b standard?What Ieee 802.11b features are supported? What is ad-hoc mode?What is ISM band? What is Spread Spectrum?What is DSSS? What is FHSS? And what are their differences? What is a MAC Address? What is WEP?How do I reset the Router? How do I resolve issues with signal loss?Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Home Router Appendix C Upgrading Firmware Figure C-1 Upgrade FirmwareTCP/IP Appendix D Windows HelpWindows 2000 or XP Instructions Windows 98SE or Me InstructionsFigure E-4 MAC Address Filter List For the Router’s Web-based UtilityAppendix F Glossary Wireless-G Home Router Wireless-G Home Router Wireless-G Home Router Wireless-G Home Router WRH54G Appendix G SpecificationsFCC Limited Warranty Appendix H Warranty InformationAppendix I Regulatory Information Wireless-G Home Router Wireless-G Home Router Wireless-G Home Router Wireless-G Home Router Wireless-G Easy Router Appendix J Contact Information