Linksys WRE54G manual Appendix B Wireless Security

Page 28

Wireless-G Range Expander

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: Pre-Shared Key and RADIUS. Pre-Shared Key gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes

asymmetric 128-Bit block data encryption. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication and the use of dynamic TKIP, AES, or WEP.

Appendix B: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

24

Security Threats Facing Wireless Networks

Image 28
Contents 802 GHz .11g Wireless- G Copyright and Trademarks Word definitionTable of Contents Power Plate Front PanelIntroduction WelcomeWhat’s in this Guide? Wireless-G Range Expander Planning your Wireless Network Ssid your wireless networks nameNetwork Topology RoamingNetwork Layout Side Panel Flash when there is wireless network activityLight will appear red Power Plate Connecting the Wireless-G Range Expander Setting Up the Wireless-G Range Expander Setup Wizard’s Welcome screenChoose an access point Security Settings screen Bit a binary digit 12 The Congratulations screen Configuring the Wireless-G Range Expander OverviewSetup Tab Basic SetupWEP Security screen Password Download to receive a file transmitted over a networkHelp Appendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions What Ieee 802.11b features are supported?What is Ad-hoc? What is Infrastructure?What is Roaming? What is ISM band?What is Spread Spectrum? What is DSSS? What is FHSS? And what are their differences?What is WEP? What is a MAC Address?How do I resolve issues with signal loss? How do I reset the Range Expander?How do I avoid interference? Security Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Range Expander Figure C-1 Upgrade Firmware Appendix C Upgrading FirmwareAppendix D Windows Help TCP/IPAppendix E Glossary Wireless-G Range Expander Wireless-G Range Expander Appendix F Specifications WEPAppendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementSafety Notices FCC Part 68 Statement Wireless-G Range Expander Appendix I Contact Information