EasyManuals Logo

Linksys WIRELESS-G WRT54GS User Manual

Linksys WIRELESS-G WRT54GS
89 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #68 background imageLoading...
Page #68 background image
61
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
Wireless-G Broadband Router with SpeedBooster
SSID. There are several things to keep in mind about the SSID:
1. Disable Broadcast
2. Make it unique
3. Change it often
Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be
more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast
the SSID.
Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.)
Hackers know these defaults and can check these against your network. Change your SSID to something unique
and not something related to your company or the networking products you use.
Change your SSID regularly so that any hackers who have gained access to your wireless network will have to
start from the beginning in trying to break in.
MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only
those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with
a random MAC Address.
WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security
concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job
more difficult.
There are several ways that WEP can be maximized:
1. Use the highest level of encryption possible
2. Use “Shared Key” authentication
3. Change your WEP key regularly
WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. WPA is stronger
than WEP encryption, and WPA2 has stronger encryption than WPA. WPA and WPA2 give you a choice of two
encryption methods: TKIP (Temporal Key Integrity Protocol), which incorporates Message Integrity Code (MIC) to
provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit
block data encryption. (AES is stronger than TKIP.)
IMPORTANT: Always remember that each
device in your wireless network MUST use
the same encryption method and encryption
key or your wireless network will not function
properly.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Linksys WIRELESS-G WRT54GS and is the answer not in the manual?

Linksys WIRELESS-G WRT54GS Specifications

General IconGeneral
Wireless Standard802.11g
Frequency Band2.4 GHz
Ethernet Ports4x 10/100 Mbps LAN, 1x 10/100 Mbps WAN
Security FeaturesWEP, WPA, WPA2, SPI Firewall
Data Transfer Rate54 Mbps
ButtonsReset, SecureEasySetup
Operating Temperature32 to 104°F (0 to 40°C)
Storage Temperature-4 to 158°F (-20 to 70°C)
Operating Humidity10% to 85% Non-condensing
Storage Humidity5% to 90% Non-condensing
Antenna2 x External
LEDsPower, DMZ, WLAN, LAN (1-4)
Power12V DC

Related product manuals