Cisco Systems WVC80N Appendix B Wireless Security Checklist, General Network Security Guidelines

Page 27

Appendix B

Wireless Security Checklist

Appendix B:

Wireless Security Checklist

Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted. Since you cannot physically prevent someone from connecting to your wireless network, you need to take some additional steps to keep your network secure.

1.Change the default wireless network name or SSID

Wireless devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. This is the name of your wireless network, and can be up to 32 characters in length. Linksys wireless products use linksys as the default wireless network name. You should change the wireless network name to something unique to distinguish your wireless network from other wireless networks that may exist around you, but do not use personal information (such as your Social Security number) because this information may be available for anyone to see when browsing for wireless networks.

2. Change the default password

For wireless products such as access points, routers, and gateways, you will be asked for a password when you want to change their settings. These devices have a default password set by the factory. The Linksys default password is admin. Hackers know these defaults and may try to use them to access your wireless device and change your network settings. To thwart any unauthorized changes, customize the device’s password so it will be hard to guess.

3. Enable MAC address filtering

Linksys routers and gateways give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so that only those computers can access your wireless network.

4. Enable encryption

Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalent Privacy (WEP) offer different levels of security for wireless communication.

A network encrypted with WPA/WPA2 is more secure than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. To protect the information as it passes over the airwaves, you should enable the highest level of encryption supported by your network equipment.

WEP is an older encryption standard and may be the only option available on some older devices that do not support WPA.

General Network Security Guidelines

Wireless network security is useless if the underlying network is not secure.

•• Password protect all computers on the network and individually password protect sensitive files.

•• Change passwords on a regular basis.

•• Install anti-virus software and personal firewall software.

•• Disable file sharing (peer-to-peer). Some applications may open file sharing without your consent and/or knowledge.

Additional Security Tips

•• Keep wireless routers, access points, or gateways away from exterior walls and windows.

•• Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations).

•• Use strong passphrases that are at least eight characters in length. Combine letters and numbers to avoid using standard words that can be found in the dictionary.

WEB: For more information on wireless security, visit www.linksysbycisco.com/security

Wireless-N Internet Home Monitoring Camera

26

Image 27
Contents User Guide Copyright and Trademarks About This GuideIcon Descriptions Online ResourcesTable of Contents Appendix F Regulatory Information Back Panel Chapter Product OverviewFront Panel Bottom PanelChapter Installing and Using Camera Utility Installing the Camera UtilityOverview Menu Icons Using the Camera UtilityLinksys by Cisco Wireless-N Internet Home Monitoring Camera LiveViewMultiple-Camera Layouts Viewing AreaView Layout View Recordings ControlsVideo Controls Video Playback SetupSetup Cameras Memory StatusCamera Details Setup Recording OptionsMy Camera List Add Camera to my listSetup Settings How to Access the Web-based Utility ChapterView Video Audio ResolutionZoom Factor SnapshotWireless Settings Setup BasicDevice Settings Network SettingsSetup Image MPEG4 SettingsMjpeg Settings Setup Administration Users Settings Setup UsersSetup Options Firmware UpgradeRtsp// Camera IP Address/img/video.sav Alternate Access Web PortUPnP Multicast RTSP/RTPSetup Motion Detection Trigger Motion DetectionMail Alert Setup Recording Set Sensitivity AreaNew Motion Trigger Schedule Network Setup StatusWireless System StatusLog HelpAppendix a Troubleshooting Common Problems and SolutionsClick View Objects Can I view video using a Macintosh or Netscape Navigator? Frequently Asked QuestionsWhat Ieee 802.11g features are supported? Appendix B Wireless Security Checklist General Network Security GuidelinesAdditional Security Tips Specifications Appendix C SpecificationsStream MPEG-4 Video and Audio Appendix D Common Gateway Interface CGI CommandsUser-Level CGI Commands User level privilege Video and Image commandsSnapshot SDP MPEG-4 video only, not for Mjpeg videoRTP/RTSP MPEG-4 video only, not for Mjpeg video URLhttp//ip/util/query.cgi?extension=value Player CommandsQuery Example rtsp//ip/img/video.sav?latency=noURL http//ip/img/query.cgi Query FW Version Admin-Level CGI Commands Administrator level privilegeReboot Restore to Factory DefaultsURLhttp//ip/adm/setgroup.cgi?parameter=value&parameter pair… Set Group ParametersHttp//ip/adm/date.cgi?action=value&parameter pair… Upgrade FirmwareURLhttp//ip/adm/upgrade.cgi Get/Set System Date and TimeURLhttp//ip/adm/admcfg.cfg Upload/Download ConfigurationDownload Configuration Content Upload Configuration ContentURLhttp//ip/adm/log.cgi Motion Detection CommandsGet Motion Detection Settings Download LogsURLhttp//IP/adm/setgroup.cgi?group=MOTION&parameter=value… Set Motion Detection SettingsWireless Commands Wireless status queryHttp//ip/adm/wirelessstatus.cgi SMB/CIFS Server/SharedFolder Commands SMB/CIFS Server SurveyURLhttp//ip/adm/smbsurvey.cgi?parameter=value¶meter=value URLhttp//ip/adm/smbdirctrl.cgi?server=value¶meter=value SMB/CIFS SharedFolder CommandBase-64 Encoder/Decoder Sample Codes Else ifchr3 == char0 enc4 = Chr2 = char0 chr3 = char0 Exclusions and Limitations Limited WarrantyObtaining Warranty Service Technical Support Safety Notices FCC StatementFCC Radiation Exposure Statement Industry Canada Radiation Exposure Statement Wireless DisclaimerIndustry Canada Statement Avis d’Industrie CanadaDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Cisco Products Software LicensesSchedule Cisco Software License Agreement Software End User License Agreement Software End User License Agreement Schedule Network Magic Features Schedule 3-A Schedule Open Source and Third Party LicensesSoftware End User License Agreement No Warranty GNU Lesser General Public License Schedule 3-BSoftware End User License Agreement Software End User License Agreement Software End User License Agreement END of Schedule 3-B Openssl License Schedule 3-CEND of Schedule 3-C

WVC80N specifications

Cisco Systems WVC80N is a cutting-edge wireless security camera designed to meet the needs of both home and business users seeking reliable surveillance solutions. This IP-based camera offers a range of features that enhance security monitoring and ease of use, making it a popular choice for those looking to implement robust security measures.

One of the standout features of the WVC80N is its wireless connectivity. Utilizing advanced wireless technology, including 802.11n Wi-Fi, this camera allows for flexible installation without the need for extensive cabling. This enables users to position the camera in various locations throughout a property, ensuring optimal coverage of key areas.

The WVC80N is equipped with a high-resolution image sensor that provides clear and detailed video footage. Users can expect crisp video quality, even in low-light conditions, thanks to its night vision capabilities. The camera also includes smart motion detection that can alert users to activity within its field of view, allowing for proactive monitoring.

Another significant feature of the Cisco WVC80N is its remote viewing capability. Users can access the camera feed from anywhere using a web browser or compatible mobile devices, providing peace of mind when away from home or the office. The camera supports secure streaming options, with encryption technologies that protect sensitive video data from unauthorized access.

The WVC80N integrates seamlessly with Cisco's networking products, enhancing overall security architecture. Users can easily configure the camera settings, including resolution, frame rate, and motion detection parameters through an intuitive web interface.

In terms of design, the Cisco WVC80N has a sleek and modern appearance that can blend with a variety of environments. Its durable construction ensures longevity, while also making it suitable for both indoor and outdoor use.

Overall, the Cisco Systems WVC80N embodies a perfect combination of advanced features, user-friendly technology, and robust performance. For those looking to invest in a versatile and reliable surveillance camera, the WVC80N represents an excellent option that caters to a wide range of security needs, making it a compelling choice in the security camera market.