Linksys WPC54GX manual Appendix B Wireless Security, Security Precautions

Page 35

Wireless-G Notebook Adapter with SRX

Appendix B: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

Security Precautions

The following is a complete list of security precautions to take (at least steps 1 through 5 should be followed):

1.Change the default SSID.

2.Disable SSID Broadcast.

3.Change the default password for the Administrator account.

4.Enable MAC Address Filtering.

5.Change the SSID periodically.

6.Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce your network performance.

7.Change the WEP encryption keys periodically.

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

Appendix B: Wireless Security

NOTE: Some of these security features are available only through the network router or access point. Refer to the router or access point’s documentation for more information.

30

Security Precautions

Image 35
Contents Wireless- G Copyright and Trademarks Table of Contents Front Panel List of Figures21 WPA-Enterprise EAP-PEAP What’s in this Guide? IntroductionWelcome Introduction What’s in this Guide? Roaming Planning Your Wireless NetworkNetwork Topology Network Layout LED Indicators GettingtoKnowtheWireless-GNotebookAdapter with SRXOverview Setting up the Wireless-G Notebook Adapter with SRXRunning the Setup Wizard Setup Wizard’s Ssid Wireless Network Name Screen WEP Setup Wizard’s WEP ScreenSetup Wizard’s WPA2-Personal Screen Setup Wizard’s Congratulations Screen Link Information Using the Wireless Network MonitorAccessing the Wireless Network Monitor Wireless Network Status Wireless Network Statistics Site Information Site SurveyProfile Information ProfilesEnter Profile Name Creating a New Profile11 Wireless Mode for New Profile 12 Ad-Hoc Mode Settings 14 WEP Settings for New Profile 16 WPA-Personal Settings EAP-TTLS EAP-TLSRadius EAP-PEAP22 Wireless Security Radius 24 Radius EAP-TTLS 26 Confirm New Settings Frequently Asked Questions Appendix a TroubleshootingCommon Problems and Solutions What is the Ieee 802.11b standard? What is roaming? What is WEP? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-G Notebook Adapter with SRX TCP/IP Appendix C Windows HelpAppendix D Glossary Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX WPC54GX Appendix E SpecificationsLimited Warranty Appendix F Warranty InformationEC Declaration of Conformity Europe Appendix G Regulatory InformationFCC Statement Industry Canada CanadaFrance Safety NoticesFCC Part 68 Statement Appendix H Contact Information
Related manuals
Manual 50 pages 23.72 Kb