Cisco Linksys WAG160N User Manual Download Page 6

Chapter 2

Wireless Security Checklist

3

Chapter 2:  
Wireless Security Checklist

Wireless  networks  are  convenient  and  easy  to  install,  so 
homes with high-speed Internet access are adopting them 
at a rapid pace. Because wireless networking operates by 
sending  information  over  radio  waves,  it  can  be  more 
vulnerable to intruders than a traditional wired network. 
Like signals from your cellular or cordless phones, signals 
from your wireless network can also be intercepted. Since 
you cannot physically prevent someone from connecting 
to your wireless network, you need to take some additional 
steps to keep your network secure. 

1.  Change the default wireless  

  network name or SSID

Wireless  devices  have  a  default  wireless  network  name 
or  Service  Set  Identifier  (SSID)  set  by  the  factory. This  is 
the name of your wireless network, and can be up to 32 
characters  in  length.  Linksys  by  Cisco  wireless  products 
use 

linksys

  as  the  default  wireless  network  name.  You 

should change the wireless network name to something 
unique  to  distinguish  your  wireless  network  from  other 
wireless networks that may exist around you, but do not 
use  personal  information  (such  as  your  Social  Security 
number)  because  this  information  may  be  available  for 
anyone to see when browsing for wireless networks. 

2.  Change the default password

For wireless products such as access points, routers, and 
modem  routers,  you  will  be  asked  for  a  password  when 
you want to change their settings. These devices have a 
default password set by the factory. The default password 
is 

admin

.  Hackers  know  these  defaults  and  may  try  to 

use them to access your wireless device and change your 
network  settings.  To  thwart  any  unauthorized  changes, 
customize  the  device’s  password  so  it  will  be  hard  to 
guess.

3.  Enable MAC address filtering

Linksys  by  Cisco  routers  and  modem  routers  give  you 
the ability to enable Media Access Control (MAC) address 
filtering. The MAC address is a unique series of numbers 
and  letters  assigned  to  every  networking  device.  With 
MAC  address  filtering  enabled,  wireless  network  access 
is provided solely for wireless devices with specific MAC 
addresses. For example, you can specify the MAC address 
of  each  computer  in  your  home  so  that  only  those 
computers can access your wireless network. 

4.  Enable encryption

Encryption  protects  data  transmitted  over  a  wireless 
network.  Wi-Fi  Protected  Access

  (WPA

/WPA2

)  and 

Wired Equivalency Privacy (WEP) offer different levels of 
security for wireless communication.

A  network  encrypted  with  WPA

/WPA2

  is  more 

secure  than  a  network  encrypted  with  WEP,  because  
WPA

/WPA2

  uses  dynamic  key  encryption.  To  protect 

the information as it passes over the airwaves, you should 
enable the highest level of encryption supported by your 
network equipment. 

WEP  is  an  older  encryption  standard  and  may  be  the 
only option available on some older devices that do not 
support WPA

.

General Network Security Guidelines

Wireless  network  security  is  useless  if  the  underlying 
network is not secure. 

Password  protect  all  computers  on  the  network  and 

 

individually password protect sensitive files.

Change passwords on a regular basis.

 

Install  anti-virus  software  and  personal  firewall 

 

software.

Disable file sharing (peer-to-peer). Some applications 

 

may  open  file  sharing  without  your  consent  and/or 
knowledge.

Additional Security Tips

Keep wireless routers, access points, or modem routers 

 

away from exterior walls and windows.

Turn wireless routers, access points, or modem routers 

 

off  when  they  are  not  being  used  (at  night,  during 
vacations).

Use strong passphrases that are at least eight characters 

 

in length. Combine letters and numbers to avoid using 
standard words that can be found in the dictionary. 

WEB:

  For  more  information  on  wireless 

security, visit 

www.linksys.com/security

Summary of Contents for Linksys WAG160N

Page 1: ...Wireless N ADSL2 Gateway Model WAG160N V2 ...

Page 2: ...urces Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksysbycisco com Linksys International www linksysbycisco com international Glossary www linksysbycisco com glossary Network Security www links...

Page 3: ...ditional Security Tips 3 Chapter 3 Installation 4 Connection 4 Setup 4 Chapter 4 Advanced Configuration 5 Appendix A Troubleshooting 6 Appendix B Specifications 7 WAG160N v2 7 Appendix C Regulatory Information 8 European Union 8 Australia 15 New Zealand 15 United States of America 15 Canada 17 Wireless Disclaimer 17 Avis de non responsabilité concernant les appareils sans fil 17 ...

Page 4: ...whenWi Fi Protected Setup is idle NOTE Wi Fi Protected Setup is a feature that makes it easy to configure your wireless network and its security settings Wireless Green The Wireless LED lights up when the wireless feature is enabled It flashes when the Modem Router is actively sending or receiving data over the network DSL Green The DSL LED lights up whenever there is a successful DSL connection T...

Page 5: ...e the wall mount slots over the screws and slide 5 the device down until the screws fit snugly into the wall mount slots Horizontal Placement The device has four rubber feet on its bottom panel Place the device on a level surface near an electrical outlet Wall Mounting Placement The device has two wall mount slots on its bottom panel The distance between the slots is 152 mm 6 inches Two screws are...

Page 6: ...g Linksys by Cisco routers and modem routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each computer...

Page 7: ...hone cable and wall jack Contact your ISP to determine if one is required UK residents need to connect the microfilter to the wall phone jack with ADSL service and then connect one end of the provided phone cable to the DSL port on it If you have more than one phone and you experience static on the line after installing the Modem Router then you need to install an additional microfilter for each p...

Page 8: ... appears Use the default user name and password admin unless you changed them when you ran the Setup Wizard You can set a new user name and password from the Administration tab s Management screen Click OK to continue Modem Router Login If you are unable to log in press the Reset button on the back panel for at least 5 seconds then wait for the device to reset and try again NOTE For users in New Z...

Page 9: ...teps these steps are specific to Internet Explorer but are similar for other browsers Select 1 Tools Internet Options Click the 2 Connections tab Select 3 Never dial a connection Click 4 OK You are using a static IP address and cannot connect Refer toWindows Help and change your Internet Protocol TCP IP Properties to Obtain an IP address automatically The computer cannot connect wirelessly to the ...

Page 10: ...evention SPI Firewall AP Isolation URL Filtering and Keyword Java ActiveX Proxy Cookie Blocking ToD Filter Blocks Access by Time VPN Passthrough for IPSec PPTP and L2TP Protocols WPA WPA2 Personal and Enterprise 128 64 Bits WEP with Passphrase WEP Key Generation SSID Broadcast Disable Access Restriction by MAC and IP Addresses Trend Micro Phase 2 Environmental Dimensions 202 x 34 x 160 mm 8 0 x 1 ...

Page 11: ...99 5 EC Italiano Italian Questo apparato é conforme ai requisiti essenziali ed agli altri principi sanciti dalla Direttiva 1999 5 CE Latviski Latvian Šī iekārta atbilst Direktīvas 1999 5 EK būtiskajām prasībām un citiem ar to saistītajiem noteikumiem Lietuvių Lithuanian Šis įrenginys tenkina 1999 5 EB Direktyvos esminius reikalavimus ir kitas šios direktyvos nuostatas Nederlands Dutch Dit apparaat...

Page 12: ...nvolved during the assessment National Restrictions This product may be used in all EU countries and other countries following the EU directive 1999 5 EC without any limitation except for the countries mentioned below Ce produit peut être utilisé dans tous les pays de l UE et dans tous les pays ayant transposés la directive 1999 5 CE sans aucune limitation excepté pour les pays mentionnés ci desso...

Page 13: ...orway Switzerland and Liechtenstein are 1 not EU member states the EU Directive 1999 5 EC has also been implemented in those countries The regulatory limits for maximum output power are 2 specified in EIRP The EIRP level of a device can be calculated by adding the gain of the antenna used specified in dBi to the output power available at the connector specified in dBm Product Usage Restrictions Th...

Page 14: ...ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady Správná likvid...

Page 15: ...ε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménages Il est de ...

Page 16: ...felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagwordeningezameldme...

Page 17: ...vnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje opreme s tem simbolom na izdel...

Page 18: ...ault Service or the Jetstream Helpdesk Cisco Linksys ADSL2 Devices on Long Lines ADSL2 devices may not achieve the type of high speed operation expected when attached to a line that is longer than intended by the ITU T Rec G 996 1 ADSL standard i e 3 km of 0 4mm cable or a shorter cable length with several tails or multiples If the device is installed in such conditions and does not give the expec...

Page 19: ...ance notice in order for you to make the necessary modifications in order to maintain uninterrupted service Intheeventthisequipmentshouldfailtooperateproperly disconnect the unit from the telephone line Try using another FCC approved device in the same telephone jack If the trouble persists call the telephone company repair service bureau If the trouble does not persist and appears to be with this...

Page 20: ...tion et de la combinaison de produits sans fil utilisés des interférences et de toute autre condition défavorable Canada The following information applies if you use the product within Canada Industry Canada Statement This device complies with Industry Canada ICES 003 and RSS210 rules Operation is subject to the following two conditions This device may not cause interference and 1 This device must...

Reviews: