Linksys WUSB200 manual Security Monitor, Allowed Channel Configuration, Channel Usage

Page 56

Wireless-G Business USB Network Adapter with RangeBooster

Allowed Channel Configuration

The Allowed Channel Configuration screen shows the channels that are allowed to be used in your wireless networks. You may select individual channels or click Check All to check all of the channels. Unclassified access points on unchecked channels will be automatically classified as untrusted.

Security Monitor

IMPORTANT: You must use a WAP200 Access Point with your USB Network Adapter to use the Security Monitor.

The Security Monitor helps to make your network more secure. It monitors the airspace through the WAP200 Access Point and USB Network Adapter for security related issues like vulnerabilities in the network configuration, which allows you to act quickly to solve issues and secure your network. The Monitor runs on the client PC, which allows the administrator to perform initial setup of security profiles and classification of the wireless network devices and later view assorted security alerts.

The Security Monitor tab displays the statistics of your wireless network and alerts you of network activity by Channel Usage, AP Inventory, Client Inventory, or Alerts.

Click Channel Usage, AP Inventory to view the statistics of the distribution on your AP’s classifications, Client Inventory to view the distribution of the client’s classifications on your wireless networks, or Alert to monitor that function.

Channel Usage

The Channel Usage screen provides statistics of the distribution on your channel’s usages. The histogram shows the number of access points in each channel, so unclassified access points can be detected. Select the specified period of time you want for the data calculations. You may select Real Time for current data, 24 hours for data within the last 24 hours, 7 days for data within the last 7 days or select days for a range of days.

Chapter 6: The Administrative Functions in the Wireless Network Monitor

Figure 6-10: Allowed Channel Configuration

Figure 6-11: Security Monitor - Channel Usage

49

Security Monitor

Image 56
Contents Wireless-G Business USB Network Adapter with RangeBooster How to Use this User Guide Copyright and TrademarksTable of Contents Appendix C Wireless Security Windows XP Wireless Zero ConfigurationList of Figures LEDsCreating a Profile WEP Key Needed 43 Editing a Profile Congratulations Introduction WelcomeWhat’s in this User Guide? Wireless-G Business USB Network Adapter with RangeBooster Roaming Planning your Wireless NetworkNetwork Topology Network Layout Getting to Know the Wireless-G Business USB Network Adapter LED IndicatorsStarting the Setup Setup Wizard’s Welcome ScreenConnecting the Adapter Setup Wizard’s License AgreementSetting up the Adapter Available Wireless NetworkWEP WPA-Personal WPA2-PersonalManual Setup 10 Creating a Profile12 Ad-Hoc Mode Settings 14 Wireless Security WPA Personal TLS WPA Enterprise EAP-TLS20 Wireless Security Radius EAP-TLS WPA2 EnterpriseRadius Using the Wireless Network Monitor Accessing the Wireless Network MonitorUsing the Wireless Network Monitors Link InformationLink Information Wireless Network Status StatusLink Information Wireless Network Statistics StatisticsProfiles Profile InformationCreating a Profile Available Wireless Network Create a New Profile10 Creating a Profile WPA-Personal 12 Creating a Profile Manual Setup Network Settings 15 Creating a Profile Manual Setup Wireless Security WEP Using the Wireless Network Monitor Create a New Profile WPA Enterprise WPA2 Enterprise Radius 24 Creating a Profile Manual Setup Wireless Security Leap 26 Creating a Profile Manual Setup Congratulations Editing a Profile29 Editing a Profile Ad Hoc Mode WEP 32 Editing a Profile Wireless Security WPA Personal 35 Editing a Profile Wireless Security WPA Enterprise Peap 37 Editing a Profile Wireless Security WPA2 Enterprise Peap Radius EAP-TLS Leap 43 Editing a Profile Congratulations Site Survey Site InformationTroubleshooting AdministrationAccess Point Account Log in as the Access Points administrator49 Administration Security Monitor Account Administrative Functions in the Wireless Network Monitor ClassificationClassification AP ClassificationAdvanced Settings Trusted MAC AddressesAllowed Vendor List Configuration Channel Usage Allowed Channel ConfigurationSecurity Monitor AP Inventory Client InventoryAlert Alerts SummaryAlert List Alert DetailsAdvice 18 Security Monitor Alert AdviceDisassociation attacking Alert Description Advice Legitimate AP Attacks or sniffing AP does not have any encryption Updated Client computers Ssid and MAC address Windows Firewall 19 Security Monitor Windows Firewall ScreenAppendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions Can users turn off the pop-up alerts?What is the 802.11b standard? What is ISM band? What is WEP? Appendix B Windows XP Wireless Zero Configuration Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Threats Facing Wireless Networks Appendix C Wireless SecuritySecurity Precautions Appendix C Wireless Security Wireless-G Business USB Network Adapter with RangeBooster Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Appendix F Specifications Unit Weight 15 oz 0.061 kg Certifications Operating TempStorage Temp Operating HumidityAppendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementWireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix I Contact Information