Linksys WPC4400N manual Appendix D Wireless Security, Security Precautions

Page 68

Wireless-N Business Notebook Adapter

Appendix D: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

Security Precautions

The following is a complete list of security precautions to take (at least steps 1 through 5 should be followed):

1.Change the default SSID.

2.Disable SSID Broadcast.

3.Change the default password for the Administrator account.

4.Enable MAC Address Filtering.

5.Change the SSID periodically.

6.Use the highest encryption algorithm possible. Use WPA/WPA2 if it is available. Please note that this may reduce your network performance.

7.Change the WEP encryption keys periodically.

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

SSID. There are several things to keep in mind about the SSID:

Appendix D: Wireless Security

Note: Some of these security features are available only through the network router or access point. Refer to the router or access point’s documentation for more information.

61

Security Precautions

Image 68 Contents
Wireless-N Business Notebook Adapter How to Use this User Guide Copyright and TrademarksTable of Contents Windows XP Wireless Zero Configuration List of Figures Front Panel10 Creating Profiles Manual Setup Network Settings 44 Administration Modify Access Point Account Introduction WelcomeWhat’s in this User Guide? Wireless-N Business Notebook Adapter Roaming Planning your Wireless NetworkNetwork Topology Network Layout Getting to Know the Wireless-N Business Notebook Adapter LED IndicatorsStarting the Setup Setup Wizard’s License AgreementConnecting the Adapter Setting up the AdapterWEP WPA-PersonalWPA2-Personal CongratulationsManual Setup Creating a Profile11 Ad-Hoc Mode Settings 13 Wireless Security WPA Personal WPA Enterprise EAP-TLS17 Wireless Security WPA2 Enterprise-EAP WPA2 EnterpriseRadius Leap Using the Wireless Network Monitor Accessing the Wireless Network MonitorUsing the Wireless Network Monitors Link InformationLink Information Wireless Network Status StatusLink Information Wireless Network Statistics StatisticsProfiles Profile InformationCreating Profiles Available Wireless Network Create a New ProfileCreating Profiles Congratulations 10 Creating Profiles Manual Setup Network Settings 12 Creating Profiles Manual Setup Wireless Security WEP WPA Personal WPA Enterprise WPA2 Enterprise Radius 21 Creating Profiles Manual Setup Wireless Security Leap 23 Creating Profiles Manual Setup Congratulations 25 Editing Profiles Ad Hoc Mode Editing a ProfileWEP 28 Editing Profiles Wireless Security WPA Personal 30 Editing Profiles Wireless Security WPA Enterprise EAP-TLS 33 Editing Profiles Wireless Security WPA2 Enterprise Peap Radius EAP-TLS Leap 39 Editing Profiles Congratulations Site Survey Site InformationTroubleshooting AdministrationAccess Point Account Log in as the Access Points administrator45 Administration Security Monitor Account Security Monitor AccountAdministrative Functions in the Wireless Network Monitor Administration Login Security Monitor AccountClassification ClassificationAdvanced Settings Trusted MAC AddressesAllowed Vendor List Configuration Allowed Ssid ConfigurationAllowed Channel Configuration AP Inventory Security MonitorChannel Usage Client Inventory Alert ListAlert Information 14 Security Monitor POP-UP AlertAdvice Windows FirewallAppendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions What is 802.11n standard?What Ieee 802.11g features are supported? What is ISM band? Appendix B Windows XP Wireless Zero Configuration Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Appendix C Wireless-N Interoperability Figure C-1 Advanced TabSecurity Threats Facing Wireless Networks Appendix D Wireless SecuritySecurity Precautions Appendix D Wireless Security Wireless-N Business Notebook Adapter Network Neighborhood/My Network Places Appendix E Windows HelpShared Resources Appendix F Glossary Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Appendix G Specifications AuthenticationStandards Tolerance +/- 1.5dBDimensions Unit Weight 76 oz 0.05 kg CertificationsAppendix H Warranty Information Limited WarrantyAppendix I Regulatory Information FCC StatementWireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Appendix J Contact Information