Linksys WGA54G manual Appendix B Wireless Security

Page 46

Wireless-G Game Adapter

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: Pre-Shared Key and RADIUS. Pre-Shared Key gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes

asymmetric 128-Bit block data encryption. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication and the use of dynamic TKIP, AES, or WEP.

Appendix B: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

40

Security Threats Facing Wireless Networks

Image 46
Contents Wireless- G Copyright and Trademarks Word definitionTable of Contents Appendix B Wireless Security List of Figures LedsXbox’s Settings Screen Welcome IntroductionAdapter a device that adds network functionality to your PC What’s in this Guide? Wireless-G Game Adapter Roaming Planning Your Wireless NetworkNetwork Topology Network LayoutPlanning Your Wireless Network Network Layout Getting to Know the Wireless-G Game Adapter Game Adapter’s LEDsGame Adapter’s Side Panel Overview Fast Setup for the Wireless-G Game AdapterInstructions Connecting the Game Adapter to Your Computer Starting the Setup Wizard Searching for the Game Adapter ScreenEasy Setup Wizard Configuration for Head-to-Head Play Setup Wizard’s Password ScreenSetup Wizard’s Head to Head Setup Screen Advanced Setup Wizard Configuration for Head-to-Head Play Setup Wizard’s Congratulations Screen11 Setup Wizard’s Head to Head Setup Screen 13 Setup Wizard’s Security Settings Screen WEP 15 Setup Wizard’s Network Settings Setup Wizard Configuration for Internet Play 17 Setup Wizard’s Congratulations Screen19 Setup Wizard’s Basic Settings Screen 21 Setup Wizard’s Security Settings Screen WPA Personal Connecting the Game Adapter to Your Game Console 23 Setup Wizard’s Confirmation ScreenSetting up the Wireless-G Game Adapter for Xbox Connecting the Game Adapter to Your XboxSetting up the Game Adapter Using Your Xbox Xbox’s Settings ScreenXbox’s Advanced Screen Xbox’s Wireless Settings Screen Xbox’s Select Network Screen Encryption encoding data transmitted in a network12 Xbox’s Security KEY Screen 14 Xbox’s Wireless Status Screen Wireless-G Game Adapter Using the Wireless-G Game Adapter Web Configuration Utility Accessing the Web Configuration UtilitySetup Tab Utility’s Setup ScreenWEP Encryption Advanced Settings Tab LANSecurity Help Tab Utility’s Help ScreenDon’t know how to change the Game Adapter’s IP address Appendix a TroubleshootingCommon Problems and Solutions Setup Wizard doesn’t seem to work properlyWhat is the Ieee 802.11g standard? Frequently Asked QuestionsWhat is the Ieee 802.11b standard? What Ieee 802.11b features are supported? What is roaming? What is ad-hoc mode? What is infrastructure mode? What is ISM band?What is WEP? What is Spread Spectrum?What is DSSS? What is FHSS? And what are their differences? What is WPA?Security Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Game Adapter Appendix C Glossary Wireless-G Game Adapter Wireless-G Game Adapter Wireless-G Game Adapter Wireless-G Game Adapter Wireless-G Game Adapter Wireless-G Game Adapter Appendix D Specifications WGA54GOperating Humidity Appendix E Warranty Information Limited WarrantyAppendix F Regulatory Information FCC StatementEC Declaration of Conformity Europe Appendix G Contact Information