Linksys WET11 manual Figure B-2 WEP Encryption

Page 36

Wireless-B Ethernet Bridge

The solution, then, is to segment your network up into multiple groups. If your network had 80 users and you used four WEP keys, a hacker would have access to only ¼ of your wireless network resources. In this way, multiple keys reduce your liability.

Finally, be sure to change your WEP key regularly, once a week or once a day. Using a “dynamic” WEP key, rather than one that is static, makes it even harder for a hacker to break into your network and steal your resources.

WEP Encryption

WEP encryption for the Bridge is configured through the Setup Wizard or the Web-based Utility’s Setup tab. For more information about the Setup Wizard, refer to “Chapter 5: Setting Up the Wireless-B Ethernet Bridge.” To enable WEP encryption through the Web-based Utility, click the WEP Key Settings button on the Setup tab. The Edit WEP Settings screen will appear, as shown in Figure B-2.

To configure the WEP settings, follow these instructions:

1.For the Default Transmit Key setting, select which WEP key (1-4) will be used when the Bridge sends data. Make sure the other wireless-equipped devices are using the same key.

2.For the WEP Encryption setting, select 64-Bit (10 hex digits) or 128-Bit (26 hex digits) from the drop-down menu.

3.The WEP Key can be generated in two ways: you can use a Passphrase or you can enter it manually.

If you wish to use a Passphrase, enter it and then click the Generate key to generate WEP key(s). The Passphrase is case-sensitive and can be a maximum of 16 alphanumeric characters. (The Passphrase function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys wireless products, you will need to enter your WEP key(s) manually on the non-Linksys wireless products.)

If you are not using a Passphrase, then you can enter one or more WEP keys manually.

In each Key field, manually enter a set of values. (Do not leave a key field blank, and do not enter all zeroes. These are not valid key values.) If you are using 64-bit WEP encryption, then each key must consist of exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, then each key must consist of exactly 26 hexadecimal characters in length. Valid hexadecimal characters are “0”-“9” and “A”-“F”.

4.Click the Apply button to apply your changes and return to the Setup tab or Cancel to cancel your changes. Click the Help button for additional on-screen information.

Appendix B: Wireless Security

Important: Always remember that each point in your wireless network MUST use the same WEP Encryption method and encryption key or your wireless network will not function properly.

Figure B-2: WEP Encryption

31

What Are the Risks?

Image 36
Contents 802 GHz .11b Wireless- B How to Use this Guide Copyright and TrademarksTable of Contents Wireless-B Ethernet Bridge Infrastructure Mode Ad-Hoc ModeIntroduction IntroductionWhat’s in this Guide? Wireless-B Ethernet Bridge Ad-Hoc versus Infrastructure Mode Network TopologyAd-Hoc Mode Getting to Know the Wireless-B Ethernet Bridge LANPWR Connecting the Wireless-B Ethernet Bridge for Setup Connect the Ethernet Network CableSetting Up the Wireless-B Ethernet Bridge Setup WizardOverview List of Bridges Wireless Settings WEP Key Connecting the Wireless-B Ethernet Bridge for Network Use Using the Wireless-B Ethernet Bridge Web-based Utility Starting the Web-based UtilitySetup WirelessSite Survey Password Tab Advanced MAC AddressLAN Settings Wireless SettingsStatus LAN StatisticsHelp Help TabAppendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions Web-based Utility doesn’t detect the BridgeWhat is ad-hoc mode? What is Spread Spectrum? Appendix B Wireless Security Brief OverviewWhat Are the Risks? Passive Attacks Jamming AttacksMaximizing Wireless Security Active AttacksDictionary-Building or Table Attacks Man-in-the-Middle AttacksWireless-B Ethernet Bridge Ssid Wireless-B Ethernet Bridge WEP Encryption Figure B-2 WEP EncryptionAppendix C Upgrading Firmware Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Appendix F Specifications ModelStandards Ieee 802.11b, Ieee Ports ButtonsWarranty Year Limited Operating HumidityStorage Humidity Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementIndustry Canada Canada Wireless-B Ethernet Bridge Appendix I Contact Information