Linksys WUSB54GP manual Appendix B Wireless Security, Security Precautions

Page 34

Wireless-G Portable USB Adapter

Appendix B: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

Security Precautions

The following is a complete list of security precautions to take (at least steps 1 through 5 should be followed):

1.Change the default SSID.

2.Disable SSID Broadcast.

3.Change the default password for the Administrator account.

4.Enable MAC Address Filtering.

5.Change the SSID periodically.

6.Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce your network performance.

7.Change the WEP encryption keys periodically.

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

SSID. There are several things to keep in mind about the SSID:

Appendix B: Wireless Security

Note: Some of these security features are available only through the network router or access point. Refer to the router or access point’s documentation for more information.

28

Security Precautions

Image 34
Contents 4802GHz.11g Wireless-G Copyright and Trademarks Table of Contents Wireless-G Portable USB Adapter Setup Wizard’s Welcome Screen List of FiguresProfiles Confirm New Settings Profiles Congratulations Introduction WelcomeWhat’s in this Guide? Wireless-G Portable USB Adapter Network Topology Planning your Wireless NetworkRoaming Planning your Wireless Network Network LayoutSoftware Installation and Configuration for Windows Setup Wizard’s Welcome ScreenWireless Mode Screen Ad-Hoc Mode Settings Screen Software instructions for the computer Connecting the Portable USB Adapter A USB PortUsing the USB Extension Base Windows 2000 Digital Signature ScreenDriver Installation for Windows XP XP Setup Welcome ScreenWindows XP Wireless Zero Configuration Network Connection No WEPNetwork Connection WEP Overview Using the Wlan MonitorAccessing the Wlan Monitor Link Information TabLink Information Tab More Information Site Survey Tab Site Survey TabProfiles Tab Profiles TabImporting a Profile Creating a New Profile Create Connection Profile10 Profiles Network Settings 12 Profiles Ad-Hoc Settings 14 Profiles Confirm New Settings Appendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions What is the Ieee 802.11b standard?What is ad-hoc mode? What is DSSS? What is FHSS? And what are their differences? Security Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Portable USB Adapter Appendix C Windows Help TCP/IPAppendix D Glossary Wireless-G Portable USB Adapter Wireless-G Portable USB Adapter Appendix E Specifications WUSB54GPFCC, CE Appendix F Warranty Information Limited WarrantyAppendix G Regulatory Information FCC StatementAppendix H Contact Information