Cisco Systems WBP54G manual Appendix B Wireless Security

Page 27

Wireless-G Bridge for Phone Adapters

SSID. There are several things to keep in mind about the SSID:

1.Disable Broadcast

2.Make it unique

3.Change it often

Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.

Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.

Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.

MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.

WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more difficult.

There are several ways that WEP can be maximized:

1.Use the highest level of encryption possible

2.Use “Shared Key” authentication

3.Change your WEP key regularly

WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are available: WPA and WPA2. For encryption, WPA automatically uses Temporal Key Integrity Protocol (TKIP), which incorporates Message Integrity Code (MIC) to provide protection against hackers. WPA2-Personal only uses Advanced Encryption Standard (AES) encryption, which is stronger than TKIP and utilizes a symmetric 128-bit block data encryption.

WPA. Enter a password in the Passphrase field of 8-63 characters.

Appendix B: Wireless Security

IMPORTANT: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.

22

Security Threats Facing Wireless Networks

Image 27
Contents User Guide Word definition Copyright and TrademarksTable of Contents List of Figures Power PortFigure C-10 BIN File Information Screen Introduction WelcomeAdapter a device that adds network functionality to your PC What’s in This User Guide? Topology the physical layout of a network Planning Your Wireless NetworkNetwork Topology RoamingNetwork Layout Port Getting to Know the Wireless-G Bridge for Phone AdaptersOverview LEDsCombination Cable CableRunning the Setup Wizard Starting the Setup WizardCheck for Compatibility Screen Connecting the Network Cable to a Router Screen Wireless-G Bridge Setup Screen Encryption encoding data transmitted in a network WPA11 Security Settings WEP 64-Bit Screen 13 Confirmation Screen 17 Disconnect the Network Cable from Phone Adapter Screen 19 Wireless is Now Active Screen 20 Congratulations Screen Appendix a Troubleshooting Common Problems and SolutionsSpeed of the wireless connection is very slow What Ieee 802.11b features are supported? Frequently Asked QuestionsWhat is the Ieee 802.11b standard? What is the Ieee 802.11g standard?What is the ISM band? What Ieee 802.11g features are supported?What is infrastructure mode? What is roaming?What is WPA? What is Spread Spectrum?What is DSSS? What is FHSS? And what are their differences? What is WEP?Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Bridge for Phone Adapters Appendix C Upgrading Firmware To upgrade the Bridge’s firmware, follow these instructionsFigure C-4 Choose Destination Location Figure C-8 Browsed Devices on Network Screen Click Files Figure C-9 Open Firmware File Disconnect the Ethernet network cable from the PC TCP/IP Appendix D Windows HelpAppendix E Glossary Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters WBP54G Appendix F SpecificationsCertifications Appendix G Warranty Information Appendix H Regulatory Information Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Applicable Power Levels in France Open the Wireless Network Connection window Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Wireless-G Bridge for Phone Adapters Europe Mail Address Appendix I Contact Information
Related manuals
Manual 2 pages 513 b

WBP54G specifications

The Cisco Systems WBP54G is a wireless Bridge Access Point that enhances the connectivity of wired Ethernet devices to a wireless network. This device is particularly useful for connecting devices that do not have built-in wireless capabilities, such as printers, game consoles, or surveillance cameras, enabling seamless integration into existing Wi-Fi networks.

One of the main features of the WBP54G is its capability to bridge wired and wireless networks with ease. The device operates effortlessly within the 802.11g wireless standard, offering a maximum data rate of 54 Mbps. It ensures reliable communication and provides backward compatibility with 802.11b devices, making it a versatile choice for a variety of environments.

The WBP54G is equipped with advanced security protocols, including WEP, WPA, and WPA2 encryption methods, which help protect sensitive data transmitted over the network. This ensures that users can connect their devices without compromising security. Moreover, the WBP54G features a user-friendly web-based interface for easy configuration and management, making setup straightforward even for non-technical users.

Another significant characteristic of the WBP54G is its robust design that allows for flexible placement options. It can be powered via Power over Ethernet (PoE), minimizing the need for additional power outlets and simplifying installation in locations where power access may be limited.

Additionally, the device supports multiple operational modes, including Bridge Mode and Access Point Mode, facilitating a variety of networking needs. The bridge mode allows for the connection of multiple Ethernet devices, creating a comprehensive network solution, while access point mode can be utilized to expand the reach of an existing wireless network.

In terms of performance, the Cisco WBP54G offers a range of up to 100 meters indoors and up to 300 meters outdoors, making it suitable for both home and office use. The device is also designed to handle a moderate number of concurrent connections, ensuring efficient management of network traffic.

Overall, the Cisco Systems WBP54G stands as a reliable solution for enhancing wireless connectivity, blending advanced technology with user-friendly features to meet the needs of various users looking to extend their network’s capabilities.