Linksys WAP200RF manual Appendix B Wireless Security, Security Precautions

Page 53

Wireless-G Access Point with Power Over Ethernet and Rangebooster

Appendix B: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

Security Precautions

The following is a complete list of security precautions to take (as shown in this User Guide) (at least steps 1 through 5 should be followed):

1.Change the default SSID.

2.Disable SSID Broadcast.

3.Change the default password for the Administrator account.

4.Enable MAC Address Filtering.

5.Change the SSID periodically.

6.Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce your network performance.

7.Change the WEP encryption keys periodically.

To ensure network security, steps one through five should be followed, at least.

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

Appendix B: Wireless Security

Note: Some of these security features are available only through the network router or access point. Refer to the router or access point’s documentation for more information.

47

Security Precautions

Image 53
Contents User Guide Copyright and Trademarks How to Use this User GuideTable of Contents Frequently Asked Questions Appendix a TroubleshootingAppendix B Wireless Security List of Figures Example of a Simple Wireless Network20 Security Monitor Basic Settings Welcome IntroductionWhat’s in this User Guide? Introduction What’s in this User Guide? Roaming Planning Your Wireless NetworkNetwork Topology Network Layout Example of a simple wireless network LEDs Getting to Know the Wireless-G Access PointPorts Access Point’s port are located on the back of the deviceAntennas and Positions Desktop Placement and Antenna SetupConnection Connecting the Wireless-G Access PointOverview Wall-Mount Option Placement OptionsStand Option Accessing the Utility Setting Up the Wireless-G Access PointNavigating the Utility SetupWireless Security Monitor AP ModeAdministration Status Setup Basic Setup Tab Configuring the Wireless-G Access PointBasic Setup Network SetupTime Setup Time TabBasic Settings Wireless Basic Wireless Settings TabWireless Security Wireless Wireless Security TabWPA2-Personal WPA-Personal aka WPA-PSKWPA-Enterprise WPA2-Personal MixedWPA2-Enterprise Mixed WPA2-EnterpriseRadius DisableWireless Connection Control Wireless Wireless Connection Control TabWireless Client List Connection ControlAdvanced Settings Wireless Advanced Wireless Settings TabVlan Wireless Vlan & QoS TabQoS MAC Address AP Mode Tab18 Wireless Repeater Mode 19 Wireless Bridge Mode Security Monitor Accounts Security Monitor Basic Settings TabWireless Security Monitor Mail Notification Security Monitor Event Log TabSyslog Notification Web Access Administration Management TabLocal AP Password ManagementIdentification SnmpLog Administration Log TabEmail Alert Notification Queue LengthAdministration Firmware Upgrade Tab Administration Factory Default TabFactory Default Firmware UpgradeAdministration Config Management Tab Administration Reboot TabReboot Config ManagementLocal Network Status Local Network TabInformation Wireless Network Status Wireless TabWireless WiredStatus System Performance Tab System PerformancePage Frequently Asked Questions Appendix a Troubleshooting What Ieee 802.11g features are supported? What is the ISM band? Does the Access Point function as a firewall? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Page Appendix C Upgrading Firmware Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary 802.11F Wireless Roaming Appendix F Specifications11g 14 dBm Dhcp Client11.g 54Mbps@ -72dBm, 11.b 11Mbps@ -85dBM SecurityCertification Wireless Security MonitorSuspicious network events Limited Warranty Appendix G Warranty InformationAppendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Information section in this Guide Appendix I Contact InformationNeed to contact Linksys?