Linksys WRT160N manual Chapter Wireless Security Checklist, General Network Security Guidelines

Page 7

Chapter 2

Wireless Security Checklist

Chapter 2:

Wireless Security Checklist

Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted. Since you cannot physically prevent someone from connecting to your wireless network, you need to take some additional steps to keep your network secure.

1.Change the default wireless network name or SSID

Wireless devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. This is the name of your wireless network, and can be up to 32 characters in length. Linksys wireless products use linksys as the default wireless network name. You should change the wireless network name to something unique to distinguish your wireless network from other wireless networks that may exist around you, but do not use personal information (such as your Social Security number) because this information may be available for anyone to see when browsing for wireless networks.

2. Change the default password

For wireless products such as access points and routers, you will be asked for a password when you want to change their settings. These devices have a default password set by the factory. The Linksys default password is admin. Hackers know these defaults and may try to use them to access your wireless device and change your network settings. To thwart any unauthorized changes, customize the device’s password so it will be hard to guess.

3. Enable MAC address filtering

Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so that only those computers can access your wireless network.

4. Enable encryption

Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalent Privacy (WEP) offer different levels of security for wireless communication.

A network encrypted with WPA/WPA2 is more secure than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. To protect the information as it passes over the airwaves, you should enable the highest level of encryption supported by your network equipment.

WEP is an older encryption standard and may be the only option available on some older devices that do not support WPA.

General Network Security Guidelines

Wireless network security is useless if the underlying network is not secure.

•• Password protect all computers on the network and individually password protect sensitive files.

•• Change passwords on a regular basis.

•• Install anti-virus software and personal firewall software.

•• Disable file sharing (peer-to-peer). Some applications may open file sharing without your consent and/or knowledge.

Additional Security Tips

•• Keep wireless routers, access points, or gateways away from exterior walls and windows.

•• Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations).

•• Use strong passphrases that are at least eight characters in length. Combine letters and numbers to avoid using standard words that can be found in the dictionary.

WEB: For more information on wireless security, visit www.linksys.com/security

Wireless-N Broadband Router

6

Image 7
Contents Wireless-N Broadband Router Copyright and Trademarks About This GuideIcon Descriptions Online ResourcesTable of Contents Appendix D Regulatory Information Appendix C Warranty InformationAppendix E Software End User License Agreement Front Panel Placement PositionsHorizontal Placement Chapter Product OverviewSuggested Mounting Hardware Wall-Mounting PlacementGeneral Network Security Guidelines Chapter Wireless Security ChecklistAdditional Security Tips Internet Setup Chapter Advanced ConfigurationHow to Access the Web-Based Utility Setup Basic SetupPPPoE Static IPPptp L2TP Optional SettingsTelstra Cable Dhcp Reservation Network SetupDhcp Server Setting Router IPDynDNS.org Setup DdnsTime Setting Ddns ServiceAdvanced Routing Setup MAC Address CloneSetup Advanced Routing MAC Address CloneBasic Wireless Settings Wireless Basic Wireless SettingsRouting Table Wi-Fi Protected Setup Wireless Wireless SecurityWireless Security Radius WPA2 PersonalWPA Enterprise WPA2 EnterpriseMAC Address Filter List Wireless Wireless MAC FilterWireless MAC Filter Access RestrictionWireless Client List Advanced WirelessInternet Filter Security FirewallSecurity VPN Passthrough FirewallVPN Passthrough Internet Access PolicySummary Single Port Forwarding Applications and Gaming Single Port ForwardingPort Range Triggering Applications and Gaming Port Range ForwardingApplications & Gaming Port Range Triggering Port Range ForwardingApplications and Gaming QoS QoS Quality of ServiceWireless Applications and Gaming DMZCategory Internet Access PriorityRemote Access Administration ManagementRouter Access Web AccessUPnP Administration LogBackup and Restore LogDiagnostics Administration DiagnosticsAdministration Factory Defaults RebootStatus Router Administration Firmware UpgradeStatus Local Network Dhcp Server Status Wireless NetworkWireless Network Local NetworkYour computer cannot connect to the Internet Appendix a TroubleshootingWRT160N Appendix B SpecificationsObtaining Warranty Service Limited WarrantyExclusions and Limitations General Technical SupportFCC Statement Safety NoticesFCC Radiation Exposure Statement Industry Canada Statement Wireless DisclaimerAvis d’Industrie Canada Изисквания Приложими CE Marking Wireless Equipment Wireless-N/G/A/B ProductsNational Restrictions Third-Party Software or Firmware Product Usage RestrictionsItaly Latvia GHz RestrictionsDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Software Licenses Cisco ProductsSchedule Cisco Software License Agreement Software End User License Agreement Software End User License Agreement GNU General Public License Schedule Network Magic FeaturesSchedule Open Source and Third Party Licenses Schedule 3-ASoftware End User License Agreement Software End User License Agreement Schedule 3-B No WarrantyEND of Schedule 3-A GNU Lesser General Public License Software End User License Agreement Software End User License Agreement Software End User License Agreement END of Schedule 3-B Schedule 3-COriginal SSLeay License OpenSSL LicenseEND of Schedule 3-C Router de banda ancha Wireless-N Copyright y marcas comerciales Acerca de esta guíaDescripciones de los iconos Recursos en líneaContenido Apéndice D Información sobre normativa Apéndice C Información de garantíaPosiciones de colocación Capítulo Descripción del productoPanel frontal Panel posteriorPiezas de montaje recomendadas Colocación en la paredLista de comprobación de seguridad inalámbrica CapítuloSetup Basic Setup Configuración Configuración básica Internet Setup Configuración de InternetCómo acceder a la utilidad basada en web Connect on Demand Max Idle Time Conectar cuando se Static IP IP estáticaOptional Settings Parámetros opcionales Reserva Dhcp Network Setup Configuración de redDhcp Server Setting Parámetro de servidor Dhcp IP del routerTime Setting Parámetro de hora Setup Configuración DdnsDdns Service Servicio Ddns MAC Address Clone Clonación de direcciones MAC Setup Advanced Routing Configuración Enrutamiento avanzadoDynamic Routing Enrutamiento dinámico RIP Static Routing Enrutamiento estáticoRouting Table Tabla de enrutamiento Basic Wireless Settings Parámetros inalámbricos básicosMétodo n.º Wi-Fi Protected Setup Configuración Wi-Fi protegidaWireless Security Seguridad inalámbrica Security Mode Modo de seguridadSecurity Mode Modo de seguridad WPA2 Personal Lista de filtros de direcciones MAC Access Restriction Restricción de accesoWireless Client List Lista de clientes inalámbricos Advanced Wireless Parámetros inalámbricos avanzadosSecurity VPN Passthrough Seguridad Paso a través de VPN Security Seguridad FirewallInternet Filter Filtros de Internet Web Filter Filtro webVPN Passthrough Paso a través de VPN Internet Access Policy Directiva de acceso a InternetResumen Single Port Forwarding Reenvío de puerto único Port Range Forwarding Reenvío de intervalos de puertos QoS calidad de servicio Wireless InalámbricoApplications and Gaming Aplicaciones y juegos DMZ Applications and Gaming Aplicaciones y juegos QoSMAC Address Dirección MAC Category CategoríaApplications Aplicaciones Online Games Juegos en líneaSummary Resumen Web Access Acceso webRemote Access Acceso remoto Management GestiónLog Registro Administration Log Administración RegistroAdministration Diagnostics Administración Diagnóstico RegistroPing Test Prueba de ping Reboot ReinicioDiagnostics Diagnóstico Factory Defaults Parámetros predeterminados de fábricaRouter Information Información del router Status Estado RouterInternet Connection Conexión a Internet Dhcp Server Servidor Dhcp Status Wireless Network Estado Red inalámbricaWireless Network Red inalámbrica Local Network Red localSu ordenador no puede conectarse a Internet Apéndice a Resolución de problemasWRT160N Apéndice B EspecificacionesExclusiones y limitaciones Garantía limitadaObtención del servicio de garantía Para devolución de productos Asistencia técnicaInformación sobre normativa Apéndice DIndustry Canada Statement Una copia impresa ofrecida junto al producto Marca CE Equipo inalámbrico productos Wireless-N/G/A/BRestricciones nacionales Software o firmware de terceros Restricciones de uso del productoDocumentos técnicos en Restricciones para 2,4 GHzDansk Danish Miljøinformation for kunder i EU Información sobre normativa Norsk Norwegian Miljøinformasjon for kunder i EU Información sobre normativa Acuerdo de licencia del software de Cisco Productos de CiscoLicencias de software AnexoAcuerdo de licencia del software para el usuario final Acuerdo de licencia del software para el usuario final Licencia Pública General DE GNU Anexo Características de Network MagicLicencias de terceros y de código abierto Anexo 3-APreámbulo Acuerdo de licencia del software para el usuario final Ausencia DE Garantía Anexo 3-BFIN DEL Anexo 3-A Licencia Pública General Reducida DE GNU Acuerdo de licencia del software para el usuario final Acuerdo de licencia del software para el usuario final Acuerdo de licencia del software para el usuario final FIN DEL Anexo 3-B Anexo 3-CLicencia original de SSLeay Licencia de OpenSSLFIN DEL Anexo 3-C Router Sem fios N de banda larga Direitos de autor e marcas comerciais Acerca deste manualDescrições dos ícones Recursos onlineAnexo B Especificações Anexo a Resolução de problemasA/B Marca CE Restrições nacionais Anexo D Informações de regulamentaçãoPosições de colocação Capítulo Descrição geral do produtoPainel frontal Painel traseiroMaterial de montagem sugerido Colocação na paredeSugestões adicionais de segurança Lista de verificação da segurança sem fiosComo aceder ao utilitário baseado na Web Configuração da InternetSetup Configuração Basic Setup Configuração básica Configuração automática DhcpInternet Connection Type Tipo de ligação à Internet PPPoE IP estáticoDefinições opcionais Clientes já reservados Configuração da redeIP do router Definição do servidor de DhcpDefinição da hora Setup Configuração DdnsServiço Ddns Encaminhamento avançado Clonar endereço MACEncaminhamento dinâmico RIP Encaminhamento estático Definições sem fios básicasTabela de encaminhamento Modo de segurança Segurança sem fiosSecurity Mode Modo de segurança WPA Enterprise Lista de filtros de endereços MAC Wireless Sem fios Wireless MAC Filter Filtro MAC sem fiosFiltro MAC sem fios Restrição de acessoSem fios avançadas Wireless Client List Lista de clientes sem fiosFiltro da Internet Security Segurança FirewallFiltro Web Resumo Security Segurança VPN Passthrough Passagem VPNPassagem VPN Política de acesso à InternetReencaminhamento de porta única Intervalo de reencaminhamento de portas Tabela de clientes Dhcp Applications and Gaming Aplicações e jogos DMZApplications and Gaming Aplicações e jogos QoS Intervalo de accionamento de portasCategoria QoS Qualidade do serviçoSem fios Prioridade de acesso à InternetPorta Ethernet GestãoAcesso ao router Acesso à WebCópia de segurança e restauro Administration Administração Log RegistoRegisto Acesso remotoTeste de rastreio de rota ReiniciarDiagnósticos Teste de pingInformações sobre o router Status Estado Local Network Rede localPredefinições de fábrica Actualização do firmwareServidor de Dhcp Rede localRede sem fios Computador não consegue estabelecer ligação à Internet Anexo a Resolução de problemasAmbiente Anexo B EspecificaçõesObter o serviço de garantia Anexo C Informações sobre a garantiaGarantia limitada Exclusões e limitaçõesGeral Suporte técnicoAnexo D Informações de regulamentação Industry Canada Statement Изисквания Приложими Equipamento sem fios Produtos sem fios N/G/A/B Restrições nacionaisSoftware ou firmware de terceiros Restrições à utilização do produtoDocumentos técnicos em Restrições da banda de 2,4 GHzDansk Danish Miljøinformation for kunder i EU Informações de regulamentação Norsk Norwegian Miljøinformasjon for kunder i EU Informações de regulamentação Licenças de software Produtos da CiscoContrato de Licença do Utilizador Final para Software Contrato de Licença do Utilizador Final para Software Anexo Funcionalidades do Network Magic Licença Pública Geral GNU Anexo Licenças de Terceiros e Open SourcePreâmbulo Termos E Condições Para CÓPIA, Distribuição E Modificação Contrato de Licença do Utilizador Final para Software FIM do Anexo 3-A Garantias NÃO IncluídasLicença Pública Geral Menor GNU Termos E Condições Para CÓPIA, Distribuição E Modificação Contrato de Licença do Utilizador Final para Software Contrato de Licença do Utilizador Final para Software Contrato de Licença do Utilizador Final para Software Licença OpenSSL FIM do Anexo 3-BFIM do Anexo 3-C Licença SSLeay Original
Related manuals
Manual 47 pages 58.56 Kb