IMPORTANT: Securing your wireless environment

 

10

Using radio waves, a wireless network introduces some security risks which are not present in a wired network; an unauthorized third party can intercept transmitted data, gain access to your wireless network, … In order to make your wireless network as secure as a wired network you should apply, at least, the following guidelines :

1 - Change the SSID

Your wireless network is identified on the basis of an SSID (Service Set Identifier). This parameter, which can be considered as the network name, is broadcasted periodically through a beacon. Also the SSID is, in most cases, set default to a well known value. To improve the security you can :

1.disable the SSID broadcast. Users who want to connect to your wireless network must know this value to become connected. Also, your wireless network becomes invisible to a third party.

2.change the default value of the SSID. The SSID can contain maximal 32 characters and it's best to choose a value which is not too obvious.

2 - Activate WEP

To guarantee that your data is transmitted in a private manner, you should activate WEP (Wired Equivalent Privacy). Use of this protocol will result in your data being encrypted while travelling through the air. Choose the largest encryption key possible (in most cases this is 128 bits) and make sure that each PC on your wireless network uses the same key as the access point.

You can even improve the security by changing the WEP-key on a regular base.

3 - Activate MAC-address control list

By means of the MAC-address list, also known as the Association Control List, you can determine which client adapters can access your wireless network. This is done by introducing the MAC-address of the client adapter in the concerned list of the access point. A MAC address consists of 12 characters (0-9,A-F) and can be found on the back of the client adapter. A client adapter whose MAC address is not included in the list will not be granted access to your wireless network.

4 - Change / activate passwords

Configuration of the access point is done through a web browser. Secure this access, and any other access which may exist, by a carefully chosen password. If a default password, set by the manufacturer, is used, you should replace this by your own password.

See the detailed user manual on CD-ROM to find more information on how to configure these security recommendations.

Step 1:

3

Install Line Filter

 

Devices such as fax machines or phones that share the same phone line as your ADSL account require a line filter, which protects your phone or fax from ADSL frequencies. Filters can be in the form of a Y-Line Filter or a Belgium-Line Filter. Both can be used if your ADSL modem will share the same phone jack with another device.

If your ADSL modem and another device will share the same 5-pole phone jack, install a Belgium-Line Filter.

If your wall socket is a RJ11 and your modem shares the line with another device, install a Y-Line Filter.

Y-Line Filters

1.Unplug the device’s cord from

the phone jack.

2.Plug the Y-Line Filter into the

 

phone jack.

2.

3.

Plug the phone cord (or other

3.

 

device cord) into the ”PHONE”

 

 

 

jack of your Y-Line Filter.

4.

4.

Plug the ADSL cord into the

 

”ADSL” jack of your Y-Line Filter.

Belgium Line Filter

1.

Unplug the device’s cord

 

 

from the phone jack.

 

2.

Plug the Belgium-Line Filter

2.

 

into the phone jack.

3.

 

 

3.Plug the phone cord (or other device cord) into the ”PHONE” jack of your Belgium-Line Filter.

4. Plug the ADSL cord into the ”ADSL” jack of your Belgium-Line Filter.

4.