Linksys WUSB200 manual Wireless-G Business USB Network Adapter with RangeBooster

Page 78

Wireless-G Business USB Network Adapter with RangeBooster

WPA-Personal. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, and enter a password in the Passphrase field of 8-63 characters.

WPA Enterprise. WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router or other device.) WPA Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys.

WPA2. WPA2 is a wireless security standard that defines stronger encryption, authentication and key management than WPA.

RADIUS. WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router or other device.)

Implementing encryption may have a negative impact on your network’s performance, but if you are transmitting sensitive data over your network, encryption should be used.

These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer.

Appendix C: Wireless Security

71

Security Threats Facing Wireless Networks

Image 78
Contents Wireless-G Business USB Network Adapter with RangeBooster How to Use this User Guide Copyright and TrademarksTable of Contents Appendix C Wireless Security Windows XP Wireless Zero ConfigurationList of Figures LEDsCreating a Profile WEP Key Needed 43 Editing a Profile Congratulations Introduction WelcomeWhat’s in this User Guide? Wireless-G Business USB Network Adapter with RangeBooster Planning your Wireless Network Network TopologyRoaming Network Layout Getting to Know the Wireless-G Business USB Network Adapter LED IndicatorsStarting the Setup Setup Wizard’s Welcome ScreenConnecting the Adapter Setup Wizard’s License AgreementSetting up the Adapter Available Wireless NetworkWEP WPA-Personal WPA2-PersonalManual Setup 10 Creating a Profile12 Ad-Hoc Mode Settings 14 Wireless Security WPA Personal TLS WPA Enterprise EAP-TLS20 Wireless Security Radius EAP-TLS WPA2 EnterpriseRadius Using the Wireless Network Monitors Using the Wireless Network MonitorAccessing the Wireless Network Monitor Link InformationLink Information Wireless Network Status StatusLink Information Wireless Network Statistics StatisticsProfiles Profile InformationCreating a Profile Available Wireless Network Create a New Profile10 Creating a Profile WPA-Personal 12 Creating a Profile Manual Setup Network Settings 15 Creating a Profile Manual Setup Wireless Security WEP Using the Wireless Network Monitor Create a New Profile WPA Enterprise WPA2 Enterprise Radius 24 Creating a Profile Manual Setup Wireless Security Leap 26 Creating a Profile Manual Setup Congratulations Editing a Profile29 Editing a Profile Ad Hoc Mode WEP 32 Editing a Profile Wireless Security WPA Personal 35 Editing a Profile Wireless Security WPA Enterprise Peap 37 Editing a Profile Wireless Security WPA2 Enterprise Peap Radius EAP-TLS Leap 43 Editing a Profile Congratulations Site Survey Site InformationTroubleshooting AdministrationAccess Point Account Log in as the Access Points administrator49 Administration Security Monitor Account Administrative Functions in the Wireless Network Monitor ClassificationClassification AP ClassificationAdvanced Settings Trusted MAC AddressesAllowed Vendor List Configuration Allowed Channel Configuration Security MonitorChannel Usage AP Inventory Client InventoryAlert Alerts SummaryAlert List Alert DetailsAdvice 18 Security Monitor Alert AdviceDisassociation attacking Alert Description Advice Legitimate AP Attacks or sniffing AP does not have any encryption Updated Client computers Ssid and MAC address Windows Firewall 19 Security Monitor Windows Firewall ScreenAppendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions Can users turn off the pop-up alerts?What is the 802.11b standard? What is ISM band? What is WEP? Appendix B Windows XP Wireless Zero Configuration Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Appendix C Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix C Wireless Security Wireless-G Business USB Network Adapter with RangeBooster Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Appendix F Specifications Storage Temp Unit Weight 15 oz 0.061 kg CertificationsOperating Temp Operating HumidityAppendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementWireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix I Contact Information