Linksys WAP54GPE manual Appendix B Wireless Security

Page 54

Wireless-G Exterior Access Point

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: Enterprise and RADIUS. Enterprise gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication and the use of dynamic TKIP, AES, or WEP.

Appendix B: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

48

Security Threats Facing Wireless Networks

Image 54
Contents 802 GHz .11g Wireless- G How to Use this User Guide Copyright and TrademarksTable of Contents Appendix a Troubleshooting Appendix B Wireless SecurityFrequently Asked Questions List of Figures 15 Wireless Advanced Wireless Introduction WelcomeWhat’s in this User Guide? Wireless-G Exterior Access Point Roaming Planning Your Wireless NetworkNetwork Topology Network LayoutExample of a Simple Wireless Network Receiving data from a wireless device Getting to Know the Wireless-G Exterior Access PointWireless LEDsEthernet That supports Power over Ethernet PoEPorts AntennaReset Button and Ground Reset Button GroundAntenna Pattern Internal Antenna Pattern Horizontal PlaneWireless-G Exterior Access Point Wireless-G Exterior Access Point Connecting the Wireless-G Exterior Access Point Hardware InstallationOverview Ground the Access Point Setting Up the Wireless-G Exterior Access Point Accessing the UtilityEnter the Host Name and IP Address settings on this screen SetupWireless Navigating the UtilityAP Mode AdministrationStatus Network Setup Configuring the Wireless-G Exterior Access PointSetup Tab IP SettingsSetup Time Tab TimeWireless Basic Wireless Settings Tab Wireless NetworkConfigure the Wireless Network attributes for each Ssid Wireless-G Exterior Access Point Disabled Wireless Wireless Security TabWireless Security WPA-Personal aka WPA-PSKWPA2-Personal WPA2-Personal MixedWPA-Enterprise WPA2-Enterprise11 Wireless Wireless Security WPA2 Enterprise Mixed WPA2-Enterprise MixedRadius Wireless Wireless Connection Control Tab Wireless Connection ControlSelect MAC Address From Networked Computers Wireless Advanced Wireless Settings Tab Advanced WirelessWireless-G Exterior Access Point AP Mode Tab MAC AddressWireless Repeater 17 Wireless Repeater18 Site Survey Web Access Administration Management TabAP Password Local AP PasswordWireless-G Exterior Access Point Administration Log Tab LogWireless-G Exterior Access Point Factory Default Administration Factory Default TabAdministration Firmware Upgrade Tab Firmware UpgradeAdministration Reboot Tab RebootOn this screen you can reboot the Access Point Administration Config Management Tab Config ManagementStatus Local Network Tab InformationLocal Network Status Wireless Tab 26 Status WirelessStatus System Performance Tab WiredWireless System PerformanceWireless-G Exterior Access Point Appendix a Troubleshooting Frequently Asked QuestionsWhat Ieee 802.11g features are supported? What is the ISM band? Does the Access Point function as a firewall? Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Exterior Access Point Figure C-1 Firmware Upgrade Appendix C Upgrading FirmwareAppendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G Exterior Access Point Wireless-G Exterior Access Point Wireless-G Exterior Access Point Wireless-G Exterior Access Point Standards Appendix F SpecificationsModel IEEE802.11g, IEEE802.11b, IEEE802.3u, IEEE802.3afTo 95%, Non-Condensing Operating HumidityStorage Humidity External antenna is sold separatelyAppendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementWireless-G Exterior Access Point Wireless-G Exterior Access Point Wireless-G Exterior Access Point Wireless-G Exterior Access Point Dual-Band Wireless Access Point Information section in this Guide Appendix I Contact InformationNeed to contact Linksys? Linksys