Linksys WPG54G manual Appendix B Wireless Security, Security Precautions

Page 41

Wireless-G Presentation Player

Appendix B: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.

Security Precautions

The following is a complete list of security precautions to take (at least steps 1 through 5 should be followed):

1.Change the default SSID.

2.Disable SSID Broadcast.

3.Change the default password for the Administrator account.

4.Enable MAC Address Filtering.

5.Change the SSID periodically.

6.Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce your network performance.

7.Change the WEP encryption keys periodically.

For information on implementing these security features, refer to “Chapter 5: Configuring the Wireless-B Broadband Router.”

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:

Change the administrator’s password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s password regularly.

Appendix B: Wireless Security

Note: Some of these security features are available only through the network router or access point. Refer to the router or access point’s documentation for more information.

34

Security Precautions

Image 41
Contents 802 GHz .11g Wireless- G Copyright and Trademarks Table of Contents Appendix B Wireless Security Appendix a TroubleshootingMonitor/Projector Connection List of FiguresLinksys Presentation Converter Icon Welcome IntroductionWhat’s in this Guide? Wireless-G Presentation Player Roaming Planning your Wireless NetworkNetwork Topology Network Layout Back Panel Getting to Know the Presentation PlayerOverview Infrared Sensor Front PanelRemote Control Remote ControlHardware Installation Connecting the Presentation PlayerPower Connection LAN Connection Installing the Stand for Vertical Placement Placement OptionsInstallation Setting up the Presentation PlayerDestination Location Congratulations Setup Tab How to Access the Web-based UtilityNetwork Settings WEP Settings Player Password Administration TabStatus Tab Status TabHelp Tab Help TabControl Utility Using the Control UtilityPresentation Options Browse for your File Remote Display Using the Remote Display Presentation UtilityPresentation List Using a USB Memory Disk to Install Files Using a USB Memory Disk to Install Files Linksys Presentation Converter Icon ConversionConvert your File Common Problems and Solutions Appendix a Troubleshooting Wireless-G Presentation Player What is the Ieee 802.11g standard? Frequently Asked QuestionsWhat is a BSS ID? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-G Presentation Player Appendix C Upgrading Firmware Figure C-1 Upgrade FirmwareTCP/IP Appendix D Windows HelpAppendix E Glossary Wireless-G Presentation Player Wireless-G Presentation Player Wireless-G Presentation Player Wireless-G Presentation Player Wireless-G Presentation Player Appendix F Specifications Limited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationWireless-G Presentation Player Appendix I Contact Information