Linksys WUSB54GC manual Appendix C Wireless Security

Page 59

Compact Wireless-G USB Adapter

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: WPA-Personal and WPA-Enterprise. WPA-Personal gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption Standard), which utilizes a symmetric 128-Bit block data encryption. WPA-Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys, and it uses a RADIUS (Remote Authentication Dial-In User Service) server for authentication.

Appendix C: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

52

Security Threats Facing Wireless Networks

Image 59
Contents 4802GHz.11gWireless-G Copyright and Trademarks How to Use this User GuideTable of Contents Compact Wireless-G USB Adapter Front Panel List of FiguresMore Information Wireless Network Status 39 Leap Welcome IntroductionWhat’s in this Guide? Compact Wireless-G USB Adapter Roaming Planning your Wireless NetworkNetwork Topology Network Layout Planning your Wireless NetworkLED Indicators Getting to Know the Compact Wireless-G USB AdapterStarting the Setup Wizard Setting up and Connecting the USB AdapterConnecting the Adapter Screen Connecting the AdapterAvailable Wireless Network Setting Up the AdapterSecureEasySetup Logo and Location Setting Up the Adapter with SecureEasySetupChanges, refer to Using the Wireless Network Monitor Encryption encoding data transmitted in a network Setting Up the Adapter with Available Networks12 PSK2 Needed for Connection Changes, refer to Using the Wireless Network Monitor 15 Network Settings Setting Up the Adapter with Manual Setup16 Wireless Mode WEP PSK2 WPA PersonalEAP-TLS WPA EnterpriseRadius Leap 27 Confirm New Settings Link Information Screens Using the Wireless Network MonitorAccessing the Wireless Network Monitor Wireless Network Status Wireless Network Statistics SecureEasySetup Button SecureEasySetupSecureEasySetup is Complete Site Information Site SurveyProfile Information Profiles15 Export a Profile Creating a New Profile19 The SecureEasySetup Logo and Location 21 SecureEasySetup Complete 22 Available Wireless Network 25 PSK2 Needed for Connection 26 The Congratulations Screen 28 Network Settings 31 Wireless Security 32 Wireless Security WEP 33 Wireless Security WPA Personal 35 Wireless Security WPA Enterprise EAP-TLS 37 Wireless Security Radius EAP-TLS 39 Leap 41 The Congratulations Screen Common Problems and Solutions Appendix a TroubleshootingWhat is the Ieee 802.11b standard? Frequently Asked QuestionsWhat is ad-hoc mode? What is DSSS? What is FHSS? And what are their differences? Figure B-1 Wireless Network Monitor Icon Appendix B Using Windows XP Wireless ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Threats Facing Wireless Networks Appendix C Wireless SecuritySecurity Precautions Appendix C Wireless Security Compact Wireless-G USB Adapter Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Limited Warranty Appendix F Warranty InformationDbpsk 1 Mbps 802.11g Ofdm Appendix G SpecificationsModel StandardsStorage Humidity Storage TempOperating Humidity FCC Statement Appendix H Regulatory InformationCompact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Dual-Band Wireless Access Point Appendix I Contact Information