Linksys WET11 manual Ssid

Page 34

Wireless-B Ethernet Bridge

5) SSID

There are a few things you can do to make your SSID more secure:

a. Disable broadcast

b. Make it unique

c. Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. This is a option for convenience, allowing anyone to log into your wireless network. In this case, however, anyone includes hackers. So don't broadcast the SSID.

A default SSID is set on your wireless devices by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Changing your SSID regularly will force any hacker attempting to gain access to your wireless network to start looking for that new SSID.

With these three steps in mind, please remember that while SSIDs are good for segmenting networks, they fall short with regards to security. Hackers can usually find them quite easily.

6) MAC Addresses

Enable MAC address filtering if your wireless products allow it. MAC address filtering will allow you to provide access to only those wireless nodes with certain MAC addresses. This makes it harder for a hacker using a random MAC address or spoofing (faking) a MAC address.

7) Firewalls

Once a hacker has broken into your wireless network, if it is connected to your wired network, they’ll have access to that, too. This means that the hacker has effectively used your wireless network as a backdoor through your firewall, which you've put in place to protect your network from just this kind of attack via the Internet.

You can use the same firewall technology to protect your wired network from hackers coming in through your wireless network as you did for the Internet. Rather than connecting your access point to an unprotected switch, swap those out for a router with a built-in firewall. The router will show the access point coming in through its Internet port and its firewall will protect your network from any transmissions entering via your wireless network.

Appendix B: Wireless Security

29

What Are the Risks?

Image 34
Contents 802 GHz .11b Wireless- B How to Use this Guide Copyright and TrademarksTable of Contents Wireless-B Ethernet Bridge Infrastructure Mode Ad-Hoc ModeIntroduction IntroductionWhat’s in this Guide? Wireless-B Ethernet Bridge Ad-Hoc versus Infrastructure Mode Network TopologyAd-Hoc Mode Getting to Know the Wireless-B Ethernet Bridge LANPWR Connecting the Wireless-B Ethernet Bridge for Setup Connect the Ethernet Network CableSetup Wizard Setting Up the Wireless-B Ethernet BridgeOverview List of Bridges Wireless Settings WEP Key Connecting the Wireless-B Ethernet Bridge for Network Use Using the Wireless-B Ethernet Bridge Web-based Utility Starting the Web-based UtilitySetup WirelessSite Survey Password Tab Advanced MAC AddressStatus LAN SettingsWireless Settings LAN StatisticsHelp Help TabAppendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions Web-based Utility doesn’t detect the BridgeWhat is ad-hoc mode? What is Spread Spectrum? Brief Overview Appendix B Wireless SecurityWhat Are the Risks? Passive Attacks Jamming AttacksDictionary-Building or Table Attacks Maximizing Wireless SecurityActive Attacks Man-in-the-Middle AttacksWireless-B Ethernet Bridge Ssid Wireless-B Ethernet Bridge WEP Encryption Figure B-2 WEP EncryptionAppendix C Upgrading Firmware Shared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Standards Ieee 802.11b, Ieee Ports Appendix F SpecificationsModel ButtonsOperating Humidity Warranty Year LimitedStorage Humidity Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementIndustry Canada Canada Wireless-B Ethernet Bridge Appendix I Contact Information