Appendix B: Wireless Security; Security Precautions; Security Threats Facing Wireless Networks - Linksys WRT54G3G-AT User Manual

2.4ghz wireless-g router for mobile broadband
Hide thumbs Also See for WRT54G3G-AT:
Table of Contents

Advertisement

Wireless-G Router for Mobile Broadband

Appendix B: Wireless Security

Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of
Linksys products provide several network security features, but they require specific action on your part for
implementation. So, keep the following in mind whenever you are setting up or using your wireless network.
IMPORTANT: Linksys strongly recommends that you enable wireless security on your wireless
network. Otherwise, unauthorized users may be able to access the Internet using your service and
incur additional charges. You are liable for any and all additional charges from your service provider.

Security Precautions

The following is a complete list of security precautions to take (at least steps 1 through 5 should be followed):
1. Change the default SSID.
2. Disable SSID Broadcast.
3. Change the default password for the Administrator account.
4. Enable MAC Address Filtering.
5. Change the SSID periodically.
6. Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce
your network performance.
7. Change the WEP encryption keys periodically.
For information on implementing these security features, refer to "Chapter 8: Configuring the Wireless-G Router
for Mobile Broadband."

Security Threats Facing Wireless Networks

Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking
products first listen for "beacon messages". These messages can be easily decrypted and contain much of the
network's information, such as the network's SSID (Service Set Identifier). Here are the steps you can take:
Change the administrator's password regularly. With every wireless networking device you use, keep in mind
that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the only
Appendix B: Wireless Security
Security Precautions
65

Advertisement

Table of Contents
loading

Table of Contents