Linksys WBP54G V2 manual Appendix B Wireless Security

Page 28

Wireless-G Bridge for Phone Adapters

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: WPA and WPA2. For encryption, WPA automatically uses Temporal Key Integrity Protocol (TKIP), which incorporates Message Integrity Code (MIC) to provide protection against hackers. WPA2-Personal only uses Advanced Encryption Standard (AES) encryption, which is stronger than TKIP and utilizes a symmetric 128-bit block data encryption.

WPA. Enter a password in the Passphrase field of 8-63 characters.

Appendix B: Wireless Security

IMPORTANT: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

22

Security Threats Facing Wireless Networks

Image 28
Contents User Guide Copyright and Trademarks Word definitionTable of Contents Page Power Port Browsed Devices on Network Screen Select Bridge Introduction Adapter a device that adds network functionality to your PCWhat’s in This User Guide? Planning Your Wireless Network Network TopologyRoaming Topology the physical layout of a networkNetwork Layout Getting to Know the Wireless-G Bridge for Phone Adapters OverviewLEDs PortCable Or IP phoneStarting the Setup Wizard Running the Setup WizardCheck for Compatibility Screen Power on the Bridge Screen Wireless-G Bridge Setup Screen WPA Encryption encoding data transmitted in a network11 Security Settings WEP 64-Bit Screen 13 Confirmation Screen Wireless-G Bridge for Phone Adapters 19 Wireless is Now Active Screen 20 Congratulations Screen Common Problems and Solutions Appendix a TroubleshootingSpeed of the wireless connection is very slow Frequently Asked Questions What is the Ieee 802.11b standard?What is the Ieee 802.11g standard? What Ieee 802.11b features are supported?What Ieee 802.11g features are supported? What is infrastructure mode?What is roaming? What is the ISM band?What is Spread Spectrum? What is DSSS? What is FHSS? And what are their differences?What is WEP? What is WPA?Security Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Bridge for Phone Adapters To upgrade the Bridge’s firmware, follow these instructions Appendix C Upgrading FirmwareFigure C-4 Choose Destination Location Figure C-8 Browsed Devices on Network Screen Click Files Figure C-9 Open Firmware File Disconnect the Ethernet network cable from the PC Appendix D Windows Help TCP/IPAppendix E Glossary Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Appendix F Specifications WBP54GCertifications Appendix G Warranty Information Limited WarrantyObtaining Warranty Service Technical Support Appendix H Regulatory Information Dual-Band Wireless Access Point Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Dual-Band Wireless Access Point Appendix I Contact Information