RF-Link Technology WRT55AG Appendix C Configuring Wireless Security, Background, WEP Encryption

Models: WRT55AG

1 62
Download 62 pages 1.08 Kb
Page 50
Image 50

Instant Wireless® Series

Appendix C: Configuring Wireless Security

Background

The Router offers two wireless security features. The basic feature is Wired Equivalent Privacy (WEP) encryption, an encryption method used to protect your wireless data communications. WEP uses 64-bit, 128-bit, or 152-bit keys to provide access control to your network and encryption security for every data transmission. To decode a data transmission, each point in a network must use an identical key. Higher encryption levels mean higher levels of security, but due to the complexity of the encryption, they may mean decreased network performance.

You may also have heard the term “40-bit” used in conjunction with WEP encryption. This is simply another term for 64-bit WEP encryption. This level of WEP encryption has been called 40-bit because it uses a 40-bit secret key along with a 24-bit Initialization Vector (40 + 24 = 64). Wireless vendors may use either name. Linksys uses the term “64-bit” when referring to this level of encryption.

Note: WEP encryption is an additional data security measure and not essential for router operation; however, Linksys recommends the use of WEP encryption.

The second wireless security feature is 802.1x. The IEEE 802.1x standard spec- ifies authentication methods for a wireless client, such as a PC, to access a net- work, so network security is enhanced. Based on the Extensible Authentication Protocol (EAP), 802.1x designates how a client accesses a network server, fre- quently a RADIUS server, with the Router acting as an authenticator. When a network uses 802.1x, the identity of the client is verified before the client is allowed network access.

For example, a wireless user may use one of the authentication methods to access a wireless network protected by an authentication server. The user’s PC sends a request to the Router (an access point can be used instead). The Router sends an identification request back to the PC. After the PC sends the Router the identification message, the Router forwards the identification message to the server. If the server accepts the identification message, then the PC is permitted access to the wireless network.

Dual-Band Wireless A+G Broadband Router

There are two types of WEP encryption for 802.1x, static and dynamic. Static WEP keys are more vulnerable and can only be changed manually on all devices, including the Router. If you are using MD5 authentication, then you can only use static WEP keys. Dynamic WEP keys are keys that are renewed automatically on a periodic basis. This makes the WEP key(s) more difficult to break, so network security is strengthened. To enable dynamic WEP keys, you must use 802.1x certificate-based authentication methods, such as TLS or TTLS.

WEP Encryption

Make sure your wireless network is functioning before attempting to configure WEP encryption.

On a wireless network, a 128-bit WEP encrypted device will NOT communi- cate with a 64-bit WEP encrypted device. Therefore, make sure that all of the wireless devices on each network are using the same encryption level.

In addition to enabling WEP, Linksys also recommends the following security implementations:

Change the SSID from the default “linksys”

Change the SSID on a regular basis

Change the WEP key regularly

Enable MAC address filtering (if your wireless products allow it)

For instructions on how to configure the Router’s WEP settings, go to the “Setup” section of “Chapter 7: The Router’s Web-Based Utility.” For instruc- tions on how to configure the WEP settings of your PC’s wireless adapter, refer to your wireless adapter’s documentation.

92

 

93

 

 

 

Page 50
Image 50
RF-Link Technology WRT55AG manual Appendix C Configuring Wireless Security, Background, WEP Encryption

WRT55AG specifications

The RF-Link Technology WRT55AG is a versatile wireless router designed to cater to the demands of both home and small office environments. As a dual-band device, it operates on both the 2.4 GHz and 5 GHz frequency bands, allowing for enhanced network flexibility and reduced interference. This capability makes it ideal for settings where multiple devices compete for bandwidth, such as homes filled with smart devices and media streaming.

One of the standout features of the WRT55AG is its support for advanced wireless standards, including IEEE 802.11a/b/g/n. This broad compatibility ensures that users can connect various devices, from older laptops and smartphones to the latest smart home gadgets, without issues. The router boasts a maximum theoretical data rate of up to 300 Mbps on the 2.4 GHz band and 450 Mbps on the 5 GHz band, providing ample speed for high-definition video streaming, online gaming, and large file transfers.

Security is a top priority for the WRT55AG, which incorporates WPA2 encryption and can easily configure firewall settings to protect user data from external threats. The router also features a robust Quality of Service (QoS) management tool that enables users to prioritize bandwidth for specific applications or devices. This ensures that crucial tasks, such as video conferencing or online gaming, receive the necessary resources to function optimally.

In terms of connectivity, the WRT55AG is equipped with four Gigabit Ethernet ports, allowing for wired connections to gaming consoles, PCs, and other network devices. This feature is particularly beneficial for users who require stable connections with minimal latency. The router also supports USB connectivity, enabling file sharing and media streaming directly from USB storage devices connected to the router.

The RF-Link Technology WRT55AG also incorporates user-friendly setup options, including an intuitive web interface for quick configuration. With support for both IPv4 and IPv6 protocols, this router is future-proof, ensuring that it remains relevant as Internet standards evolve.

Overall, the RF-Link WRT55AG stands out as a reliable and feature-rich router that meets the needs of modern households and small offices. Its combination of speed, security, and versatility makes it a solid choice for users looking to enhance their wireless networking experience.