Linksys WUSB54GC manual Appendix C Wireless Security, Security Precautions

Page 58

Compact Wireless-G USB Adapter

Appendix C: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

Security Precautions

The following is a complete list of security precautions to take (at least steps 1 through 5 should be followed):

1.Change the default SSID.

2.Disable SSID Broadcast.

3.Change the default password for the Administrator account.

4.Enable MAC Address Filtering.

5.Change the SSID periodically.

6.Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce your network performance.

7.Change the WEP encryption keys periodically.

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

SSID. There are several things to keep in mind about the SSID:

Appendix C: Wireless Security

Note: Some of these security features are available only through the network router or access point. Refer to the router or access point’s documentation for more information.

51

Security Precautions

Image 58
Contents 4802GHz.11gWireless-G How to Use this User Guide Copyright and TrademarksTable of Contents Compact Wireless-G USB Adapter List of Figures Front PanelMore Information Wireless Network Status 39 Leap Introduction WelcomeWhat’s in this Guide? Compact Wireless-G USB Adapter Network Topology Planning your Wireless NetworkRoaming Planning your Wireless Network Network LayoutGetting to Know the Compact Wireless-G USB Adapter LED IndicatorsSetting up and Connecting the USB Adapter Starting the Setup WizardConnecting the Adapter Connecting the Adapter ScreenSetting Up the Adapter Available Wireless NetworkSetting Up the Adapter with SecureEasySetup SecureEasySetup Logo and LocationChanges, refer to Using the Wireless Network Monitor Setting Up the Adapter with Available Networks Encryption encoding data transmitted in a network12 PSK2 Needed for Connection Changes, refer to Using the Wireless Network Monitor Setting Up the Adapter with Manual Setup 15 Network Settings16 Wireless Mode WEP WPA Personal PSK2WPA Enterprise EAP-TLSRadius Leap 27 Confirm New Settings Accessing the Wireless Network Monitor Using the Wireless Network MonitorLink Information Screens Wireless Network Status Wireless Network Statistics SecureEasySetup SecureEasySetup ButtonSecureEasySetup is Complete Site Survey Site InformationProfiles Profile InformationCreating a New Profile 15 Export a Profile19 The SecureEasySetup Logo and Location 21 SecureEasySetup Complete 22 Available Wireless Network 25 PSK2 Needed for Connection 26 The Congratulations Screen 28 Network Settings 31 Wireless Security 32 Wireless Security WEP 33 Wireless Security WPA Personal 35 Wireless Security WPA Enterprise EAP-TLS 37 Wireless Security Radius EAP-TLS 39 Leap 41 The Congratulations Screen Appendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions What is the Ieee 802.11b standard?What is ad-hoc mode? What is DSSS? What is FHSS? And what are their differences? Appendix B Using Windows XP Wireless Configuration Figure B-1 Wireless Network Monitor IconFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Precautions Appendix C Wireless SecuritySecurity Threats Facing Wireless Networks Appendix C Wireless Security Compact Wireless-G USB Adapter Shared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Appendix E Glossary Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Appendix F Warranty Information Limited WarrantyStandards Appendix G SpecificationsModel Dbpsk 1 Mbps 802.11g OfdmOperating Humidity Storage TempStorage Humidity Appendix H Regulatory Information FCC StatementCompact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Dual-Band Wireless Access Point Appendix I Contact Information