Linksys WUSB200 manual Appendix C Wireless Security, Security Precautions

Page 76

Wireless-G Business USB Network Adapter with RangeBooster

Appendix C: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

Security Precautions

The following is a complete list of security precautions to take (at least steps 1 through 5 should be followed):

1.Change the default SSID.

2.Disable SSID Broadcast.

3.Change the default password for the Administrator account.

4.Enable MAC Address Filtering.

5.Change the SSID periodically.

6.Use the highest encryption algorithm possible. Use WPA/WPA2 if it is available. Please note that this may reduce your network performance.

7.Change the WEP encryption keys periodically.

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

SSID. There are several things to keep in mind about the SSID:

Appendix C: Wireless Security

Note: Some of these security features are available only through the network router or access point. Refer to the router or access point’s documentation for more information.

69

Security Precautions

Image 76
Contents Wireless-G Business USB Network Adapter with RangeBooster How to Use this User Guide Copyright and TrademarksTable of Contents Appendix C Wireless Security Windows XP Wireless Zero ConfigurationList of Figures LEDsCreating a Profile WEP Key Needed 43 Editing a Profile Congratulations Introduction WelcomeWhat’s in this User Guide? Wireless-G Business USB Network Adapter with RangeBooster Network Topology Planning your Wireless NetworkRoaming Network Layout Getting to Know the Wireless-G Business USB Network Adapter LED IndicatorsStarting the Setup Setup Wizard’s Welcome ScreenConnecting the Adapter Setup Wizard’s License AgreementSetting up the Adapter Available Wireless NetworkWEP WPA-Personal WPA2-PersonalManual Setup 10 Creating a Profile12 Ad-Hoc Mode Settings 14 Wireless Security WPA Personal TLS WPA Enterprise EAP-TLS20 Wireless Security Radius EAP-TLS WPA2 EnterpriseRadius Using the Wireless Network Monitor Accessing the Wireless Network MonitorUsing the Wireless Network Monitors Link InformationLink Information Wireless Network Status StatusLink Information Wireless Network Statistics StatisticsProfiles Profile InformationCreating a Profile Available Wireless Network Create a New Profile10 Creating a Profile WPA-Personal 12 Creating a Profile Manual Setup Network Settings 15 Creating a Profile Manual Setup Wireless Security WEP Using the Wireless Network Monitor Create a New Profile WPA Enterprise WPA2 Enterprise Radius 24 Creating a Profile Manual Setup Wireless Security Leap 26 Creating a Profile Manual Setup Congratulations Editing a Profile29 Editing a Profile Ad Hoc Mode WEP 32 Editing a Profile Wireless Security WPA Personal 35 Editing a Profile Wireless Security WPA Enterprise Peap 37 Editing a Profile Wireless Security WPA2 Enterprise Peap Radius EAP-TLS Leap 43 Editing a Profile Congratulations Site Survey Site InformationTroubleshooting AdministrationAccess Point Account Log in as the Access Points administrator49 Administration Security Monitor Account Administrative Functions in the Wireless Network Monitor ClassificationClassification AP ClassificationAdvanced Settings Trusted MAC AddressesAllowed Vendor List Configuration Security Monitor Allowed Channel ConfigurationChannel Usage AP Inventory Client InventoryAlert Alerts SummaryAlert List Alert DetailsAdvice 18 Security Monitor Alert AdviceDisassociation attacking Alert Description Advice Legitimate AP Attacks or sniffing AP does not have any encryption Updated Client computers Ssid and MAC address Windows Firewall 19 Security Monitor Windows Firewall ScreenAppendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions Can users turn off the pop-up alerts?What is the 802.11b standard? What is ISM band? What is WEP? Appendix B Windows XP Wireless Zero Configuration Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Precautions Appendix C Wireless SecuritySecurity Threats Facing Wireless Networks Appendix C Wireless Security Wireless-G Business USB Network Adapter with RangeBooster Shared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Appendix F Specifications Unit Weight 15 oz 0.061 kg Certifications Operating TempStorage Temp Operating HumidityAppendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementWireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix I Contact Information