Linksys WMP54GX manual Appendix C Wireless Security

Page 48

Wireless-G PCI Adapter with SRX

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Four modes are available: WPA-Personal, WPA2-Personal, WPA-Enterprise, and RADIUS. WPA-Personal gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption Standard), which utilizes a symmetric 128-Bit block data encryption. WPA2-Personal only uses AES encryption, which is stronger than TKIP. WPA-Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication.

Appendix C: Wireless Security

IMPORTANT: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

42

Security Threats Facing Wireless Networks

Image 48
Contents 802 GHz .11g Wireless- G How to Use This User Guide Copyright and TrademarksWord definition Table of Contents Wireless-G PCI Adapter with SRX Adapter’s Connectors for the Antenna Cables Adapter’s LEDWPA2-Personal Needed for Connection Introduction WelcomeWhat’s in This User Guide? Adapter a device that adds network functionality to your PCIntroduction What’s in This User Guide? Planning Your Wireless Network Network TopologyRoaming Topology the physical layout of a networkNetwork Layout Getting to Know the Wireless-G Notebook Adapter with SRX LED IndicatorCable Connectors OverviewStarting the Setup Wizard Setup Wizard’s Welcome ScreenInstalling the Adapter Windows will begin copying the files onto your PCSetting Up the Adapter Available Wireless Network ScreenSetting Up the Adapter with an Available Network WEP Key Needed for ConnectionWPA-Personal Needed for Connection Setting Up the Adapter with Manual Setup 12 Available Wireless Network Screen14 Wireless Mode Screen WEP 19 Wireless Security WPA2 Personal Screen EAP-TLS Radius 23 Confirm New Settings Screen Using the Wireless Network Monitor Accessing the Wireless Network MonitorWireless Network Status screen Link Information ScreensWireless Network Status More Information Wireless Network Status ScreenWireless Network Statistics More Information Wireless Network Statistics ScreenSite Survey Site InformationWPA2-Personal Needed for Connection Profiles Profiles ScreenCreating a New Profile 12 Create a New Profile14 Available Wireless Network Screen 16 WPA-Personal Needed for Connection 20 Network Settings Screen 21 Wireless Mode Screen 24 Wireless Security Screen 27 Wireless Security WPA2 Personal Screen 28 Wireless Security WPA Enterprise Using EAP-TLS Screen Radius 32 Congratulations Screen Appendix a Troubleshooting Common Problems and SolutionsWireless-G PCI Adapter does not work properly Frequently Asked Questions What is the Ieee 802.11b standard?What is the Ieee 802.11g standard? What Ieee 802.11b features are supported?What is ad-hoc mode? What is infrastructure mode?What is roaming? What is ISM band?What is DSSS? What is FHSS? And what are their differences? What is WEP?What is WPA? What is RADIUS?Appendix B Using Windows XP Wireless Zero Configuration Figure B-1 Wireless Network Monitor IconFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Appendix C Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix C Wireless Security Wireless-G PCI Adapter with SRX Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G PCI Adapter with SRX Wireless-G PCI Adapter with SRX Appendix F Specifications Operating Temp Storage TempOperating Humidity Max % Non-Condensing Storage Humidity Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementSafety Notices Appendix I Contact Information