92
Appendix B:
Important Information for Wireless Products
Wireless-G ADSL Gateway with 2 Phone Ports
MAC Addresses.
Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only
those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with
a random MAC Address.
WEP Encryption.
Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security
concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job
more difficult.
There are several ways that WEP can be maximized:
A. Use the highest level of encryption possible
B. Use a “Shared” Key
C. Use multiple WEP keys
D. Change your WEP key regularly
Implementing encryption will have a negative impact on your network’s performance. If you are transmitting
sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying the most flexible
and convenient technology Linksys has to offer.