Linksys WUSB54GS manual Appendix B Wireless Security

Page 38

Wireless-G USB Network Adapter with SpeedBooster

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: WPA-PSK and WPA-RADIUS. WPA-PSK gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption Standard), which utilizes a symmetric 128-Bit block data encryption. WPA-RADIUS offers two encryption methods, TKIP and AES, with dynamic encryption keys, and it uses a RADIUS (Remote Authentication Dial-In User Service) server for authentication.

WPA-PSK. If you do not have a RADIUS server, select the type of algorithm you want to use, TKIP or AES, and enter a password in the Passphrase field of 8-63 characters.

Appendix B: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

33

Security Threats Facing Wireless Networks

Image 38
Contents 802 GHz .11g Wireless- G How to Use this User Guide Copyright and TrademarksTable of Contents Setup Wizard’s Welcome Screen List of Figures13 Create a New Profile Introduction WelcomeWhat’s in this Guide? Wireless-G USB Network Adapter with SpeedBooster Network Topology Planning your Wireless NetworkSsid your wireless network’s name RoamingPlanning your Wireless Network Network LayoutUsing the USB Network Adapter’s Setup Wizard Setup Wizard’s Welcome ScreenWireless Mode Screen Wireless Security Screen WEP PSK+RADIUS 10 The Check Settings Screen Software instructions for the computer AdapterConnecting the USB Network Adapter A USB PortLED Indicators LinkUsing the Wireless Network Monitor Using the Wireless Network Monitor IconAccessing the Wireless Network Monitor Link InformationWireless Network Status Wireless Network Statistics Site Survey Site InformationProfiles Profile InformationCreating a New Profile 13 Create a New Profile17 Ad-Hoc Mode Settings for New Profile 18 Wireless Security for New Profile WEP20 Wireless Security PSK for New Profile PSKPSK + Radius EAP-TLS23 Wireless Security Radius Using EAP-TLS for New Profile Radius26 Congratulations for New Profile My computer does not recognize the USB Network Adapter Appendix a TroubleshootingCommon Problems and Solutions USB Network Adapter does not work properlyWhat is the Ieee 802.11g standard? Frequently Asked QuestionsWhat is the Ieee 802.11b standard? What Ieee 802.11b features are supported?What is roaming? What is ad-hoc mode?What is infrastructure mode? What is ISM band?What is DSSS? What is FHSS? And what are their differences? What is WEP?Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-G USB Network Adapter with SpeedBooster Shared Resources Appendix C Windows HelpTCP/IP Network Neighborhood/My Network PlacesAppendix D Glossary Wireless-G USB Network Adapter with SpeedBooster Wireless-G USB Network Adapter with SpeedBooster WUSB54GS Appendix E SpecificationsModel StandardsStorage Temp FCCOperating Temp Operating HumidityAppendix F Warranty Information Limited WarrantyAppendix G Regulatory Information FCC StatementAppendix H Contact Information