Linksys WPG54G manual Appendix B Wireless Security

Page 42

Wireless-G Presentation Player

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: Pre-Shared Key and RADIUS. Pre-Shared Key gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes

asymmetric 128-Bit block data encryption. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication and the use of dynamic TKIP, AES, or WEP.

Appendix B: Wireless Security

Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

35

Security Threats Facing Wireless Networks

Image 42
Contents 802 GHz .11g Wireless- G Copyright and Trademarks Table of Contents Appendix a Troubleshooting Appendix B Wireless SecurityList of Figures Monitor/Projector ConnectionLinksys Presentation Converter Icon Introduction WelcomeWhat’s in this Guide? Wireless-G Presentation Player Planning your Wireless Network Network TopologyRoaming Network Layout Getting to Know the Presentation Player OverviewBack Panel Front Panel Infrared SensorRemote Control Remote ControlConnecting the Presentation Player Hardware InstallationPower Connection LAN Connection Placement Options Installing the Stand for Vertical PlacementSetting up the Presentation Player InstallationDestination Location Congratulations How to Access the Web-based Utility Setup TabNetwork Settings WEP Settings Administration Tab Player PasswordStatus Tab Status TabHelp Tab Help TabUsing the Control Utility Control UtilityPresentation Options Browse for your File Using the Remote Display Presentation Utility Remote DisplayPresentation List Using a USB Memory Disk to Install Files Using a USB Memory Disk to Install Files Conversion Linksys Presentation Converter IconConvert your File Appendix a Troubleshooting Common Problems and SolutionsWireless-G Presentation Player Frequently Asked Questions What is the Ieee 802.11g standard?What is a BSS ID? Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Presentation Player Figure C-1 Upgrade Firmware Appendix C Upgrading FirmwareAppendix D Windows Help TCP/IPAppendix E Glossary Wireless-G Presentation Player Wireless-G Presentation Player Wireless-G Presentation Player Wireless-G Presentation Player Wireless-G Presentation Player Appendix F Specifications Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementWireless-G Presentation Player Appendix I Contact Information