Linksys WPC300N manual Appendix C Wireless Security

Page 42

Wireless-N Notebook Adapter

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: WPA Personal and Radius. WPA Personal gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication.

Appendix C: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

36

Security Threats Facing Wireless Networks

Image 42
Contents GHz How to Use this User Guide Copyright and TrademarksWord definition Table of Contents Wireless-N Notebook Adapter Setup Wizard’s Welcome Screen Front Panel11 WEP Key Needed for Connection What’s in this User Guide? IntroductionWelcome Adapter a device that adds network functionality to your PCIntroduction What’s in this User Guide? Roaming Planning your Wireless NetworkNetwork Topology Topology the physical layout of a networkNetwork Layout Getting to Know the Wireless-N Notebook Adapter LED IndicatorsSetting up and Connecting the Wireless-N Notebook Adapter Starting the SetupConnecting the Adapter Setting up the AdapterWPA Personal Needed for Connection WPA2 Personal Needed for Connection Advanced Setup Available Wireless NetworkWEP WPA Personal WPA2 PersonalRadius 18 Confirm New Settings Wireless Network Status screen Using the Wireless Network MonitorAccessing the Wireless Network Monitor Link InformationWireless Network Status Wireless Network Statistics More Information Network StatisticsConnect Site InformationProfiles Profile InformationCreate a New Profile 10 Creating a Profile12 WPA Personal Needed for Connection 15 Available Wireless Networks 17 Wireless Mode 19 Wireless Security WEP 20 Wireless Security WPA Personal 22 Wireless Security Radius EAP-TLS 24 Confirm New Settings Frequently Asked Questions Appendix a TroubleshootingCommon Problems and Solutions Wireless-N Notebook Adapter does not work properlyWhat Ieee 802.11g features are supported? What is the Ieee 802.11g standard?What 802.11b features are supported? What is ad-hoc mode?What is DSSS? What is FHSS? And what are their differences? What is ISM band?What is Spread Spectrum? What is WEP?What is WPA? What is RADIUS?Appendix B Windows XP Wireless Zero Configuration Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Appendix C Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix C Wireless Security Wireless-N Notebook Adapter Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix F Specifications Channels most of Europe and AsiaOperating Humidity Storage HumidityAppendix G Warranty Information Appendix H Regulatory Information FCC StatementWireless-N Notebook Adapter Wireless-N Notebook Adapter Applicable Power Levels in France Open the Wireless Network Connection window Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix I Contact Information Europe Mail AddressOutside of Europe Mail Address