Linksys WPC54GX manual Appendix B Wireless Security

Page 36

Wireless-G Notebook Adapter with SRX

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Three modes are available: WPA-Personal, WPA-Enterprise, and Radius. WPA-Personal gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. WPA-Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication.

Appendix B: Wireless Security

IMPORTANT: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

31

Security Threats Facing Wireless Networks

Image 36
Contents Wireless- G Copyright and Trademarks Table of Contents List of Figures Front Panel21 WPA-Enterprise EAP-PEAP Introduction WelcomeWhat’s in this Guide? Introduction What’s in this Guide? Planning Your Wireless Network Network TopologyRoaming Network Layout GettingtoKnowtheWireless-GNotebookAdapter with SRX LED IndicatorsSetting up the Wireless-G Notebook Adapter with SRX Running the Setup WizardOverview Setup Wizard’s Ssid Wireless Network Name Screen Setup Wizard’s WEP Screen WEPSetup Wizard’s WPA2-Personal Screen Setup Wizard’s Congratulations Screen Using the Wireless Network Monitor Accessing the Wireless Network MonitorLink Information Wireless Network Status Wireless Network Statistics Site Survey Site InformationProfiles Profile InformationCreating a New Profile Enter Profile Name11 Wireless Mode for New Profile 12 Ad-Hoc Mode Settings 14 WEP Settings for New Profile 16 WPA-Personal Settings EAP-TLS EAP-TTLSEAP-PEAP Radius22 Wireless Security Radius 24 Radius EAP-TTLS 26 Confirm New Settings Appendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions What is the Ieee 802.11b standard? What is roaming? What is WEP? Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Notebook Adapter with SRX Appendix C Windows Help TCP/IPAppendix D Glossary Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Wireless-G Notebook Adapter with SRX Appendix E Specifications WPC54GXAppendix F Warranty Information Limited WarrantyAppendix G Regulatory Information FCC StatementIndustry Canada Canada EC Declaration of Conformity EuropeSafety Notices FranceFCC Part 68 Statement Appendix H Contact Information
Related manuals
Manual 50 pages 23.72 Kb