Linksys WPC54GX4 manual Appendix C Wireless Security

Page 47

Wireless-G Notebook Adapter with SRX400

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Four modes are available: WPA-Personal, WPA2-Personal, WPA-Enterprise, and RADIUS. WPA-Personal gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption Standard), which utilizes a symmetric 128-Bit block data encryption. WPA2-Personal only uses AES encryption, which is stronger than TKIP. WPA-Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication.

Appendix C: Wireless Security

IMPORTANT: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

42

Security Threats Facing Wireless Networks

Image 47
Contents User Guide Word definition How to Use This User GuideCopyright and Trademarks Table of Contents Adapter’s LEDs Setup Wizard’s Welcome Screen10 Import a Profile But what does all of this mean? IntroductionWelcome What’s in This User Guide?Introduction What’s in This User Guide? Topology the physical layout of a network Planning Your Wireless NetworkNetwork Topology RoamingNetwork Layout Adapter is transmitting or receiving data Getting to Know the Wireless-G Notebook Adapter with SRX400LED Indicators Green. The LED lights up when the Adapter is powered onOn the Welcome screen, you have the following choices Starting the Setup WizardInsert the Notebook Adapter Screen Available Wireless Network Screen Setting Up the AdapterWEP Key Needed for Connection Setting Up the Adapter with an Available NetworkWPA-Personal Needed for Connection 10 Available Wireless Network Screen Setting Up the Adapter with Manual Setup12 Wireless Mode Screen Click Next to continue or click Back to change any settingsWEP 17 Wireless Security WPA2 Personal Screen EAP-TLS Radius 22 Confirm New Settings Screen Link Information Screens Using the Wireless Network MonitorAccessing the Wireless Network Monitor Wireless Network Status screenMore Information Wireless Network Status Screen Wireless Network StatusProfile Wireless Network StatisticsSite Information Site SurveyUsing the Wireless Network Monitor Site Survey Profiles Screen Profiles12 Create a New Profile Creating a New Profile14 Available Wireless Network Screen 16 WPA-Personal Needed for Connection 20 Network Settings Screen 21 Wireless Mode Screen 23 Wireless Security Screen 26 Wireless Security WPA2 Personal Screen 27 Wireless Security WPA Enterprise Using EAP-TLS Screen 29 Wireless Security Radius Using EAP-TLS Screen 32 Congratulations Screen Wireless-G Notebook Adapter does not work properly Appendix a TroubleshootingCommon Problems and Solutions Frequently Asked QuestionsWhat Ieee 802.11g features are supported? What is the Ieee 802.11b standard?What is the Ieee 802.11g standard? What Ieee 802.11b features are supported?What is DSSS? What is FHSS? And what are their differences? What is roaming?What is ISM band? What is Spread Spectrum?What is RADIUS? What is WEP?What is WPA? Figure B-3 Windows XP Wireless Configuration Icon Select Use Linksys Wireless Network MonitorFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security You are now connected to your wireless networkSecurity Threats Facing Wireless Networks Appendix C Wireless SecuritySecurity Precautions Appendix C Wireless Security Wireless-G Notebook Adapter with SRX400 Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Wireless-G Notebook Adapter with SRX400 Wireless-G Notebook Adapter with SRX400 Wireless-G Notebook Adapter with SRX400 Wireless-G Notebook Adapter with SRX400 Model Appendix F Specifications20dBm for Wireless-B/19dBm for Wireless-G Limited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationWireless-G Notebook Adapter with SRX400 Wireless-G Notebook Adapter with SRX400 Wireless-G Notebook Adapter with SRX400 Wireless-G Notebook Adapter with SRX400 Dual-Band Wireless Access Point Linksys Appendix I Contact Information