Linksys WUSB200 manual Appendix C Wireless Security

Page 77

Wireless-G Business USB Network Adapter with RangeBooster

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Three modes are available: WPA-Personal, WPA Enterprise, and Radius. WPA-Personal gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. WPA Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication.

Appendix C: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

70

Security Threats Facing Wireless Networks

Image 77
Contents Wireless-G Business USB Network Adapter with RangeBooster Copyright and Trademarks How to Use this User GuideTable of Contents Windows XP Wireless Zero Configuration Appendix C Wireless SecurityLEDs List of FiguresCreating a Profile WEP Key Needed 43 Editing a Profile Congratulations Welcome IntroductionWhat’s in this User Guide? Wireless-G Business USB Network Adapter with RangeBooster Roaming Planning your Wireless NetworkNetwork Topology Network Layout LED Indicators Getting to Know the Wireless-G Business USB Network AdapterSetup Wizard’s Welcome Screen Starting the SetupSetup Wizard’s License Agreement Connecting the AdapterAvailable Wireless Network Setting up the AdapterWEP WPA2-Personal WPA-Personal10 Creating a Profile Manual Setup12 Ad-Hoc Mode Settings 14 Wireless Security WPA Personal TLS EAP-TLS WPA EnterpriseWPA2 Enterprise 20 Wireless Security Radius EAP-TLSRadius Accessing the Wireless Network Monitor Using the Wireless Network MonitorUsing the Wireless Network Monitors Link InformationStatus Link Information Wireless Network StatusStatistics Link Information Wireless Network StatisticsProfile Information ProfilesCreate a New Profile Creating a Profile Available Wireless Network10 Creating a Profile WPA-Personal 12 Creating a Profile Manual Setup Network Settings 15 Creating a Profile Manual Setup Wireless Security WEP Using the Wireless Network Monitor Create a New Profile WPA Enterprise WPA2 Enterprise Radius 24 Creating a Profile Manual Setup Wireless Security Leap Editing a Profile 26 Creating a Profile Manual Setup Congratulations29 Editing a Profile Ad Hoc Mode WEP 32 Editing a Profile Wireless Security WPA Personal 35 Editing a Profile Wireless Security WPA Enterprise Peap 37 Editing a Profile Wireless Security WPA2 Enterprise Peap Radius EAP-TLS Leap 43 Editing a Profile Congratulations Site Information Site SurveyAdministration TroubleshootingLog in as the Access Points administrator Access Point Account49 Administration Security Monitor Account Classification Administrative Functions in the Wireless Network MonitorAP Classification ClassificationTrusted MAC Addresses Advanced SettingsAllowed Vendor List Configuration Channel Usage Allowed Channel ConfigurationSecurity Monitor Client Inventory AP InventoryAlerts Summary AlertAlert Details Alert List18 Security Monitor Alert Advice AdviceDisassociation attacking Alert Description Advice Legitimate AP Attacks or sniffing AP does not have any encryption Updated Client computers Ssid and MAC address 19 Security Monitor Windows Firewall Screen Windows FirewallCommon Problems and Solutions Appendix a TroubleshootingCan users turn off the pop-up alerts? Frequently Asked QuestionsWhat is the 802.11b standard? What is ISM band? What is WEP? Windows XP Wireless Zero Configuration Appendix B Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Threats Facing Wireless Networks Appendix C Wireless SecuritySecurity Precautions Appendix C Wireless Security Wireless-G Business USB Network Adapter with RangeBooster Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Appendix F Specifications Operating Temp Unit Weight 15 oz 0.061 kg CertificationsStorage Temp Operating HumidityLimited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationWireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix I Contact Information