Linksys WPC4400N manual Appendix D Wireless Security

Page 69

Wireless-N Business Notebook Adapter

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Three modes are available: WPA-Personal, WPA Enterprise, and Radius. WPA-Personal gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. WPA Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication.

Appendix D: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

62

Security Threats Facing Wireless Networks

Image 69 Contents
Wireless-N Business Notebook Adapter Copyright and Trademarks How to Use this User GuideTable of Contents Windows XP Wireless Zero Configuration Front Panel List of Figures10 Creating Profiles Manual Setup Network Settings 44 Administration Modify Access Point Account Welcome IntroductionWhat’s in this User Guide? Wireless-N Business Notebook Adapter Planning your Wireless Network Network TopologyRoaming Network Layout LED Indicators Getting to Know the Wireless-N Business Notebook AdapterSetup Wizard’s License Agreement Starting the SetupSetting up the Adapter Connecting the AdapterWPA-Personal WEPCongratulations WPA2-PersonalCreating a Profile Manual Setup11 Ad-Hoc Mode Settings 13 Wireless Security WPA Personal EAP-TLS WPA EnterpriseWPA2 Enterprise 17 Wireless Security WPA2 Enterprise-EAPRadius Leap Accessing the Wireless Network Monitor Using the Wireless Network MonitorUsing the Wireless Network Monitors Link InformationStatus Link Information Wireless Network StatusStatistics Link Information Wireless Network StatisticsProfile Information ProfilesCreate a New Profile Creating Profiles Available Wireless NetworkCreating Profiles Congratulations 10 Creating Profiles Manual Setup Network Settings 12 Creating Profiles Manual Setup Wireless Security WEP WPA Personal WPA Enterprise WPA2 Enterprise Radius 21 Creating Profiles Manual Setup Wireless Security Leap 23 Creating Profiles Manual Setup Congratulations Editing a Profile 25 Editing Profiles Ad Hoc ModeWEP 28 Editing Profiles Wireless Security WPA Personal 30 Editing Profiles Wireless Security WPA Enterprise EAP-TLS 33 Editing Profiles Wireless Security WPA2 Enterprise Peap Radius EAP-TLS Leap 39 Editing Profiles Congratulations Site Information Site SurveyAdministration TroubleshootingLog in as the Access Points administrator Access Point AccountSecurity Monitor Account 45 Administration Security Monitor AccountAdministration Login Security Monitor Account Administrative Functions in the Wireless Network MonitorClassification ClassificationTrusted MAC Addresses Advanced SettingsAllowed Ssid Configuration Allowed Vendor List ConfigurationAllowed Channel Configuration Security Monitor Channel UsageAP Inventory Alert List Client Inventory14 Security Monitor POP-UP Alert Alert InformationWindows Firewall AdviceCommon Problems and Solutions Appendix a TroubleshootingWhat is 802.11n standard? Frequently Asked QuestionsWhat Ieee 802.11g features are supported? What is ISM band? Windows XP Wireless Zero Configuration Appendix B Windows XP Wireless Zero Configuration Figure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Figure C-1 Advanced Tab Appendix C Wireless-N InteroperabilityAppendix D Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix D Wireless Security Wireless-N Business Notebook Adapter Appendix E Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix F Glossary Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Authentication Appendix G SpecificationsStandards Tolerance +/- 1.5dBUnit Weight 76 oz 0.05 kg Certifications DimensionsLimited Warranty Appendix H Warranty InformationFCC Statement Appendix I Regulatory InformationWireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter Appendix J Contact Information