Linksys WUSB300N manual Appendix C Wireless Security

Page 47

Wireless-N USB Network Adapter

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Three modes are available: WPA Personal, WPA2 Personal, WPA Enterprise, WPA2 Enterprise, and Radius. WPA Personal gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. WPA Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication.

Appendix C: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

41

Security Threats Facing Wireless Networks

Image 47
Contents GHz Word definition Copyright and TrademarksTable of Contents Wireless-N USB Network Adapter Front Panel List of Figures10 Creating a Profile Adapter a device that adds network functionality to your PC IntroductionWelcome What’s in this User Guide?Introduction What’s in this User Guide? Topology the physical layout of a network Planning your Wireless NetworkNetwork Topology RoamingNetwork Layout LED Indicators Getting to Know the Wireless-N USB Network AdapterUSB Extension Base USB Extension BaseStarting the Setup Setting up and Connecting the Wireless-N USB Network AdapterSetting up the Adapter Connecting the AdapterWEP Key Needed for Connection PSK2 Needed for Connection Advanced Setup WEP PSK PSK+RADIUS PSK2+RADIUS Radius 22 Confirm New Settings Link Information Using the Wireless Network MonitorAccessing the Wireless Network Monitor Wireless Network Status screenWireless Network Status Wireless Network Statistics Site Information ConnectProfile Information Profiles10 Creating a Profile Create a New Profile12 PSK Needed for Connection 15 Available Wireless Networks 17 Wireless Mode 19 Wireless Security WEP 20 Wireless Security PSK 23 Wireless Security PSK+RADIUS Peap Peap 26 Wireless Security Radius EAP-TLS 28 Confirm New Settings What is the 802.11b standard? Appendix a TroubleshootingCommon Problems and Solutions Frequently Asked QuestionsWhat is ad-hoc mode? What is the Ieee 802.11g standard?What 802.11b features are supported? What Ieee 802.11g features are supported?What is WEP? What is ISM band?What is Spread Spectrum? What is DSSS? What is FHSS? And what are their differences?What is RADIUS? What is WPA?What is WPA2? Windows XP Wireless Zero Configuration Appendix B Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Threats Facing Wireless Networks Appendix C Wireless SecuritySecurity Precautions Appendix C Wireless Security Wireless-N USB Network Adapter TCP/IP Appendix D Windows HelpAppendix E Glossary Wireless-N USB Network Adapter Wireless-N USB Network Adapter Wireless-N USB Network Adapter Wireless-N USB Network Adapter USB Appendix F SpecificationsStorage Temp Limited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationImportant Note Wireless-N USB Network Adapter Wireless-N USB Network Adapter Wireless-N USB Network Adapter Wireless-N USB Network Adapter Wireless-N Notebook Adapter Appendix I Contact Information