Linksys WMP54GR manual Appendix C Wireless Security

Page 44

Wireless-G PCI Adapter with RangeBooster

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Three modes are available: WPA-Personal, WPA Radius, and Radius. Radius-PSK gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. WPA RADIUS offers two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication.

Appendix C: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

38

Security Threats Facing Wireless Networks

Image 44
Contents Wireless- G Word definition How to Use This User GuideCopyright and Trademarks Table of Contents Setup Wizard’s Welcome Screen Setup Wizard’s License Agreement10 Import a Profile Adapter a device that adds network functionality to your PC IntroductionWelcome What’s in this Guide? Wireless-G PCI Adapter with RangeBooster Planning your Wireless Network Network TopologyRoaming Topology the physical layout of a networkNetwork Layout Starting the Setup Setup Wizard’s License AgreementConnecting the Adapter Setting up the AdapterWEP Key Needed for Connection Encryption encoding data transmitted in a networkCongratulations Manual Setup 10 Network SettingsWEP WPA Personal PSK2WPA Enterprise EAP-TLSRadius 19 Confirm New Settings Using the Wireless Network Monitor Accessing the Wireless Network MonitorWireless Network Status screen Link InformationWireless Network Status Wireless Network Statistics More Information-Network StatisticsSite Survey Site InformationWPA-Personal Needed for Connection Profiles Profile InformationCreate a New Profile 12 Create a New ProfileWPA Personal Needed for Connection 13 Available Wireless Network Which can be used in conjunction with a Radius server Wpa wi-fi protected access a wireless security protocolUsing Tkip Temporal Key Integrity Protocol encryption 17 Wireless Security WEP 19 Wireless Security PSK2 EAP-TLS 22 Wireless Security Radius Using EAP-TLS 25 Congratulations Appendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions What is the Ieee 802.11b standard?What is the Ieee 802.11g standard? What Ieee 802.11b features are supported?What is ad-hoc mode? What is infrastructure mode?What is roaming? What is ISM band?What is DSSS? What is FHSS? And what are their differences? What is WEP?What is WPA? What is RADIUS?Appendix B Using Windows XP Wireless Configuration Select Use Linksys Wireless Network MonitorFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Threats Facing Wireless Networks Appendix C Wireless SecuritySecurity Precautions Appendix C Wireless Security Wireless-G PCI Adapter with RangeBooster Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Wireless-G PCI Adapter with RangeBooster Wireless-G PCI Adapter with RangeBooster 802.11g Ofdm Appendix F SpecificationsProtocols Storage Humidity Storage TempOperating Humidity Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementWireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Appendix I Contact Information