Wireless-G Broadband Router with 2 Phone Ports
Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in.
MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address.
WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a
There are several ways that WEP can be maximized:
1.Use the highest level of encryption possible
2.Use “Shared Key” authentication
3.Change your WEP key regularly
WPA.
WPA
IMPORTANT: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly.
Appendix B: Wireless Security | 83 |
Security Threats Facing Wireless Networks