Linksys WRE54G manual Appendix B Wireless Security, Security Precautions

Page 27

Wireless-G Range Expander

Appendix B: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

Security Precautions

The following is a complete list of security precautions to take (as shown in this User Guide) (at least steps 1 through 5 should be followed):

1.Change the default SSID.

2.Disable SSID Broadcast.

3.Change the default password for the Administrator account.

4.Enable MAC Address Filtering.

5.Change the SSID periodically.

6.Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce your network performance.

7.Change the WEP encryption keys periodically.

To ensure network security, steps one through five should be followed, at least.

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

Appendix B: Wireless Security

Note: Some of these security features are available only through the network router or access point. Refer to the router or access point’s documentation for more information.

23

Security Precautions

Image 27
Contents 802 GHz .11g Wireless- G Word definition Copyright and TrademarksTable of Contents Front Panel Power PlateWelcome IntroductionWhat’s in this Guide? Wireless-G Range Expander Roaming Planning your Wireless NetworkSsid your wireless networks name Network TopologyNetwork Layout Flash when there is wireless network activity Side PanelLight will appear red Power Plate Connecting the Wireless-G Range Expander Setup Wizard’s Welcome screen Setting Up the Wireless-G Range ExpanderChoose an access point Security Settings screen Bit a binary digit 12 The Congratulations screen Overview Configuring the Wireless-G Range ExpanderBasic Setup Setup TabWEP Security screen Download to receive a file transmitted over a network PasswordHelp What Ieee 802.11b features are supported? Appendix a TroubleshootingCommon Problems and Solutions Frequently Asked QuestionsWhat is ISM band? What is Ad-hoc?What is Infrastructure? What is Roaming?What is a MAC Address? What is Spread Spectrum?What is DSSS? What is FHSS? And what are their differences? What is WEP?How do I reset the Range Expander? How do I resolve issues with signal loss?How do I avoid interference? Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Range Expander Appendix C Upgrading Firmware Figure C-1 Upgrade FirmwareTCP/IP Appendix D Windows HelpAppendix E Glossary Wireless-G Range Expander Wireless-G Range Expander WEP Appendix F SpecificationsLimited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationSafety Notices FCC Part 68 Statement Wireless-G Range Expander Appendix I Contact Information