Linksys WUSB54GP manual Appendix B Wireless Security

Page 35

Wireless-G Portable USB Adapter

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: WPA-PSK and WPA-RADIUS. WPA-PSK gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption Standard), which utilizes a symmetric 128-Bit block data encryption. WPA-RADIUS offers two encryption methods, TKIP and AES, with dynamic encryption keys, and it uses a RADIUS (Remote Authentication Dial-In User Service) server for authentication.

WPA-PSK. If you do not have a RADIUS server, select the type of algorithm you want to use, TKIP or AES, and enter a password in the Passphrase field of 8-63 characters.

Appendix B: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

29

Security Threats Facing Wireless Networks

Image 35
Contents 4802GHz.11g Wireless-G Copyright and Trademarks Table of Contents Wireless-G Portable USB Adapter List of Figures Setup Wizard’s Welcome ScreenProfiles Confirm New Settings Profiles Congratulations Welcome IntroductionWhat’s in this Guide? Wireless-G Portable USB Adapter Roaming Planning your Wireless NetworkNetwork Topology Network Layout Planning your Wireless NetworkSetup Wizard’s Welcome Screen Software Installation and Configuration for WindowsWireless Mode Screen Ad-Hoc Mode Settings Screen Software instructions for the computer A USB Port Connecting the Portable USB AdapterWindows 2000 Digital Signature Screen Using the USB Extension BaseXP Setup Welcome Screen Driver Installation for Windows XPNetwork Connection No WEP Windows XP Wireless Zero ConfigurationNetwork Connection WEP Link Information Tab Using the Wlan MonitorAccessing the Wlan Monitor OverviewLink Information Tab More Information Site Survey Tab Site Survey TabProfiles Tab Profiles TabImporting a Profile Create Connection Profile Creating a New Profile10 Profiles Network Settings 12 Profiles Ad-Hoc Settings 14 Profiles Confirm New Settings Common Problems and Solutions Appendix a TroubleshootingWhat is the Ieee 802.11b standard? Frequently Asked QuestionsWhat is ad-hoc mode? What is DSSS? What is FHSS? And what are their differences? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-G Portable USB Adapter TCP/IP Appendix C Windows HelpAppendix D Glossary Wireless-G Portable USB Adapter Wireless-G Portable USB Adapter WUSB54GP Appendix E SpecificationsFCC, CE Limited Warranty Appendix F Warranty InformationFCC Statement Appendix G Regulatory InformationAppendix H Contact Information