Linksys WPC54GR manual Appendix C Wireless Security

Page 44

Wireless-G Notebook Adapter with RangeBooster

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Three modes are available: WPA-Personal, WPA Enterprise, and Radius. WPA-Personal gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. WPA Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication.

Appendix C: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

38

Security Threats Facing Wireless Networks

Image 44
Contents Wireless- G Word definition How to Use this User GuideCopyright and Trademarks Table of Contents Wireless-G Notebook Adapter with RangeBooster List of Figures Front Panel10 Import a Profile Introduction WelcomeWhat’s in this User Guide? Adapter a device that adds network functionality to your PCIntroduction What’s in this User Guide? Planning your Wireless Network Network TopologyRoaming Topology the physical layout of a networkNetwork Layout Getting to Know the Wireless-G Notebook Adapter LED IndicatorsPower LinkSetting up and Connecting the Wireless-G Notebook Adapter Starting the SetupConnecting the Adapter Setting up the AdapterWEP Key Needed for Connection Congratulations Manual Setup 10 Network SettingsWEP WPA Personal PSK2WPA Enterprise EAP-TLSRadius 19 Confirm New Settings Using the Wireless Network Monitor Accessing the Wireless Network MonitorWireless Network Status screen Link InformationWireless Network Status Wireless Network Statistics More Information-Network StatisticsSite Survey Site InformationProfiles Profile InformationCreate a New Profile 12 Create a New ProfileWPA Personal Needed for Connection 13 Available Wireless Network 15 Wireless Mode 17 Wireless Security WEP 19 Wireless Security PSK2 EAP-TLS 22 Wireless Security Radius Using EAP-TLS 25 Congratulations Wireless-G Notebook Adapter does not work properly Appendix a TroubleshootingCommon Problems and Solutions Frequently Asked Questions What is the 802.11b standard?What is the Ieee 802.11g standard? What 802.11b features are supported?What is infrastructure mode? What is roaming?What is ISM band? What is Spread Spectrum?What is DSSS? What is FHSS? And what are their differences? What is WEP?What is WPA? What is RADIUS?Appendix B Windows XP Wireless Zero Configuration Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Threats Facing Wireless Networks Appendix C Wireless SecuritySecurity Precautions Appendix C Wireless Security Wireless-G Notebook Adapter with RangeBooster Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Wireless-G PCI Adapter with SpeedBooster Wireless-G PCI Adapter with SpeedBooster Wireless-G PCI Adapter with SpeedBooster Wireless-G PCI Adapter with SpeedBooster Appendix F Specifications 802.11g OfdmAppendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementWireless-G Notebook Adapter with RangeBooster Wireless-G Notebook Adapter with RangeBooster Wireless-G Notebook Adapter with RangeBooster Wireless-G Notebook Adapter with RangeBooster Wireless-G Notebook Adapter with RangeBooster Appendix I Contact Information