Linksys WAP200RF manual Appendix B Wireless Security

Page 54

Wireless-G Access Point with Power Over Ethernet and Rangebooster

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the replacement standard for WEP in Wi-Fi security. Two modes are available: Personal, and Enterprise. Both give you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. Enterprise utilizes a RADIUS server for authentication and the use of dynamic TKIP, AES, or WEP.

Appendix B: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

48

Security Threats Facing Wireless Networks

Image 54
Contents User Guide How to Use this User Guide Copyright and TrademarksTable of Contents Appendix a Troubleshooting Appendix B Wireless SecurityFrequently Asked Questions Example of a Simple Wireless Network List of Figures20 Security Monitor Basic Settings Introduction WelcomeWhat’s in this User Guide? Introduction What’s in this User Guide? Planning Your Wireless Network Network TopologyRoaming Network Layout Example of a simple wireless network Getting to Know the Wireless-G Access Point LEDsAccess Point’s port are located on the back of the device PortsDesktop Placement and Antenna Setup Antennas and PositionsConnecting the Wireless-G Access Point OverviewConnection Placement Options Stand OptionWall-Mount Option Setting Up the Wireless-G Access Point Accessing the UtilitySetup WirelessNavigating the Utility AP Mode AdministrationSecurity Monitor Status Basic Setup Configuring the Wireless-G Access PointSetup Basic Setup Tab Network SetupSetup Time Tab TimeWireless Basic Wireless Settings Tab Basic SettingsWireless Wireless Security Tab Wireless SecurityWPA-Personal aka WPA-PSK WPA2-PersonalWPA2-Personal Mixed WPA-EnterpriseWPA2-Enterprise WPA2-Enterprise MixedDisable RadiusWireless Client List Wireless Wireless Connection Control TabWireless Connection Control Connection ControlWireless Advanced Wireless Settings Tab Advanced SettingsWireless Vlan & QoS Tab VlanQoS AP Mode Tab MAC Address18 Wireless Repeater Mode 19 Wireless Bridge Mode Security Monitor Basic Settings Tab Wireless Security MonitorSecurity Monitor Accounts Security Monitor Event Log Tab Mail NotificationSyslog Notification Local AP Password Administration Management TabWeb Access ManagementSnmp IdentificationEmail Alert Administration Log TabLog Notification Queue LengthFactory Default Administration Factory Default TabAdministration Firmware Upgrade Tab Firmware UpgradeReboot Administration Reboot TabAdministration Config Management Tab Config ManagementStatus Local Network Tab InformationLocal Network Status Wireless Tab Wireless NetworkStatus System Performance Tab WiredWireless System PerformancePage Appendix a Troubleshooting Frequently Asked QuestionsWhat Ieee 802.11g features are supported? What is the ISM band? Does the Access Point function as a firewall? Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Page Appendix C Upgrading Firmware Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix F Specifications 802.11F Wireless Roaming11.g 54Mbps@ -72dBm, 11.b 11Mbps@ -85dBM Dhcp Client11g 14 dBm SecurityWireless Security Monitor Suspicious network eventsCertification Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix I Contact Information Need to contact Linksys?Information section in this Guide