Linksys WPC54G manual Appendix B Wireless Security

Page 38

Wireless-G Notebook Adapter

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Three modes are available: WPA-PSK, WPA Radius, and Radius. WPA-PSK gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. WPA RADIUS offers two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication.

Appendix B: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

33

Security Threats Facing Wireless Networks

Image 38
Contents 4802GHz.11g Wireless-G Copyright and Trademarks Word definitionTable of Contents List of Figures Front Panel21 EAP-MD5 Authentication Adapter a device that adds network functionality to your PC IntroductionWelcome What’s in this Guide? Wireless-G Notebook Adapter Roaming Planning your Wireless NetworkNetwork Topology Topology the physical layout of a networkPlanning your Wireless Network Network LayoutPower Getting to Know the Wireless-G Notebook AdapterLED Indicators LinkSoftware Installation and Configuration Software instructions for the computerInstallation Procedure Setup Wizard’s Wireless Mode ScreenWEP Bit a binary digitSetup Wizard’s Check Settings Screen WPA-PSKSetup Wizard’s Congratulations Screen Hardware Installation Connecting the AdapterLink Information Using the Wireless Network MonitorAccessing the Wireless Network Monitor Encryption encoding data transmitted in a network Internet traffic from your local area networkWireless Network Statistics Byte a unit of data that is usually eight bits longSite Survey Site InformationProfiles Profile InformationCreating a New Profile On the Profiles screen, click New to create a new profile11 Ad-Hoc Mode Settings 12 Network Settings 13 Wireless Security for New Profile 15 WPA-PSK Settings 17 WPA Radius Settings WPA RadiusEAP-MD5 EAP-TLSEAP-TTLS EAP-PEAP24 Radius Settings Radius27 EAP-MD5 Authentication 30 Confirm New Settings Wireless-G Notebook Adapter does not work properly Appendix a TroubleshootingCommon Problems and Solutions What is the 802.11g standard? Frequently Asked QuestionsWhat is the 802.11b standard? What 802.11b features are supported?What is roaming? What is ad-hoc mode?What is infrastructure mode? What is ISM band?What is DSSS? What is FHSS? And what are their differences? What is WEP?Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-G Notebook Adapter Appendix C Windows Help TCP/IPAppendix D Glossary Wireless-G Notebook Adapter Wireless-G Notebook Adapter Wireless-G Notebook Adapter Appendix E Specifications Appendix F Warranty Information Limited WarrantyIndustry Canada Canada Appendix G Regulatory InformationFCC Statement EC Declaration of Conformity Europe Safety Notices Appendix H Contact Information
Related manuals
Manual 50 pages 32.38 Kb

WPC54G specifications

The Linksys WPC54G is a wireless network adapter specifically designed for laptops and portable devices, enabling users to connect to wireless networks seamlessly. As a member of the Linksys family, the WPC54G provides robust functionality paired with ease of use, making it a popular choice for home and office environments.

One of the standout features of the WPC54G is its support for the IEEE 802.11g standard, which allows for wireless data transfer rates of up to 54 Mbps. This technology provides a significant upgrade over older standards, enabling users to enjoy faster internet speeds and smoother streaming experiences. The WPC54G is also backward compatible with the 802.11b standard, ensuring it can connect to a wide range of wireless networks.

The device employs a PCI card form factor, which makes it easy to install in most laptops. Compatibility with a range of operating systems, including Windows and Linux, enhances its versatility. The card offers a reliable connection through its use of advanced wireless technologies such as the use of Multiple Input Multiple Output (MIMO) technology, improving signal strength and stability. This allows the WPC54G to deliver high-speed connections even at greater distances from the access point.

Equipped with WEP, WPA, and WPA2 encryption protocols, the Linksys WPC54G prioritizes security, giving users peace of mind when accessing unsecured networks. This feature is especially important in today’s digital landscape, where data privacy and security are paramount.

Another significant characteristic of the WPC54G is its ease of setup. The included utility allows users to manage their connections and configure settings effortlessly, making it accessible even to those who are not technically savvy. The card also features a Linksys Easy Setup Assistant, guiding users through the installation process step by step.

In terms of physical attributes, the WPC54G is compact and designed to fit snugly into PC Card slots, ensuring portability without compromising performance. Overall, the Linksys WPC54G wireless network adapter remains a reliable choice for users seeking speed, security, and ease of use in their wireless connectivity solutions, solidifying its place in the market as a dependable networking device.