background image

Chapter2

Wireless Security Checklist

Dual Band Wreless-N Notebook Adapter

Chapter :  

Wreless Securty Checklst

Wireless networks are convenient and easy to install, so 

homes with high-speed Internet access are adopting them 

at a rapid pace. Because wireless networking operates by 

sending  information  over  radio  waves,  it  can  be  more 

vulnerable to intruders than a traditional wired network. 

Like signals from your cellular or cordless phones, signals 

from your wireless network can also be intercepted. Since 

you cannot physically prevent someone from connecting 

to your wireless network, you need to take some additional 

steps to keep your network secure. 

.  Change the default wreless  

  network name or SSID

Wireless  devices  have  a  default  wireless  network  name 

or  Service  Set  Identifier  (SSID)  set  by  the  factory.  This 

is  the  name  of  your  wireless  network,  and  can  be  up 

to  32  characters  in  length.  Linksys  wireless  products 

use 

lnksys

  as  the  default  wireless  network  name.  You 

should change the wireless network name to something 

unique  to  distinguish  your  wireless  network  from  other 

wireless networks that may exist around you, but do not 

use  personal  information  (such  as  your  Social  Security 

number)  because  this  information  may  be  available  for 

anyone to see when browsing for wireless networks. 

.  Change the default password

For wireless products such as access points and routers, 

you will be asked for a password when you want to change 

their settings. These devices have a default password set 

by  the  factory.  The  Linksys  default  password  is 

admn

Hackers  know  these  defaults  and  may  try  to  use  them 

to access your wireless device and change your network 

settings. To thwart any unauthorized changes, customize 

the device’s password so it will be hard to guess.

3.  Enable MAC address flterng

Linksys routers give you the ability to enable Media Access 

Control  (MAC)  address  filtering.  The  MAC  address  is  a 

unique  series  of  numbers  and  letters  assigned  to  every 

networking  device. With  MAC  address  filtering  enabled, 

wireless  network  access  is  provided  solely  for  wireless 

devices with specific MAC addresses. For example, you can 

specify the MAC address of each computer in your home 

so  that  only  those  computers  can  access  your  wireless 

network. 

4.  Enable encrypton

Encryption  protects  data  transmitted  over  a  wireless 

network. Wi-Fi Protected Access (WPA/WPA2) and Wired 

Equivalency Privacy (WEP) offer different levels of security 

for wireless communication.
A  network  encrypted  with  WPA/WPA2  is  more  secure 

than a network encrypted with WEP, because WPA/WPA2 

uses dynamic key encryption. To protect the information 

as  it  passes  over  the  airwaves,  you  should  enable  the 

highest  level  of  encryption  supported  by  your  network 

equipment. 

WEP  is  an  older  encryption  standard  and  may  be  the 

only option available on some older devices that do not 

support WPA.

General Network Security Guidelines

Wireless  network  security  is  useless  if  the  underlying 

network is not secure. 

Password  protect  all  computers  on  the  network  and 

individually password protect sensitive files.
Change passwords on a regular basis.
Install  anti-virus  software  and  personal  firewall 

software.
Disable file sharing (peer-to-peer). Some applications 

may  open  file  sharing  without  your  consent  and/or 

knowledge.

Additional Security Tips

Keep wireless routers, access points, or gateways away 

from exterior walls and windows.
Turn  wireless  routers,  access  points,  or  gateways 

off  when  they  are  not  being  used  (at  night,  during 

vacations).
Use strong passphrases that are at least eight characters 

in length. Combine letters and numbers to avoid using 

standard words that can be found in the dictionary. 

WEB:

  For  more  information  on  wireless 

security, visit 

www.lnksys.com/securty

Summary of Contents for Linksys WPC600N

Page 1: ...USER GUIDE Dual Band Wireless N Notebook Adapter Model No WPC600N ...

Page 2: ...ddress Online Resources Most web browsers allow you to enter the web address without adding the http in front of the address This User Guide will refer to websites without including http in front of the address Some older web browsers may require you to add it Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network Secu...

Page 3: ...Appendix B Specifications 14 Appendix C Windows XPWireless Zero Configuration 15 Windows XP Wireless Zero Configuration 15 Appendix D Warranty and Regulatory Information 17 Limited Warranty 17 FCC Statement 17 FCC Radiation Exposure Statement 18 Industry Canada Statement 18 Declaration d Industrie Canada 18 Industry Canada Radiation Exposure Statement 18 Safety Notices 18 Wireless Disclaimer 18 Av...

Page 4: ...ow does the Adapter do this Like all wireless products the Adapter allows for greater range and mobility within your wireless network whether it s using the Wireless A 802 11a Wireless G 802 11g or Wireless B 802 11b standard But with Wireless N it has even better range and speed LEDs Power Power Green The Power LED lights up when the Adapter is powered on Link Act Link Act Green The Link Act LED ...

Page 5: ...3 Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each comput...

Page 6: ... information about the current connection It also provides a More Information button to click for additional status information Link Information Ad Hoc Mode or Infrastructure Mode The screen indicates whether the Adapter is currently working in ad hoc or infrastructure mode Signal Strength The Signal Strength bar indicates signal strength Link Quality The Link Quality bar indicates the quality of ...

Page 7: ...stics BytesTransmitted This shows the bytes that the Adapter transmits in real time after connecting to the wireless network or after clicking Refresh Statistics Driver Version This shows the Adapter s driver version Noise Level This shows the level of background noise that affects the wireless signal A lower reading translates into a higher quality signal Signal Strength This is the intensity of ...

Page 8: ...Connection screen Select the appropriate level of WEP encryption 64 bit or 128 bit Then enter the network s Passphrase or WEP Key Click Connect To cancel the connection click Cancel WEP Security WPA If the network has the wireless security WPA Personal security enabled then you see the WPA Personal Needed for Connection screen Select the appropriate encryption type TKIP or AES Enter the network s ...

Page 9: ... two options for setting up the Adapter Available Wireless Networks For most users Use this option if you already have a network set up The networks available to this Adapter are listed on this screen You can choose one of these networks and click Connect to connect to it Click Refresh to update the Available Wireless Networks list AdvancedSetup Ifyournetworkisnotlistedonthisscreen select Advanced...

Page 10: ...racters in the Pre shared Key field Click Connect and proceed to Step 3 WPA2 Personal Wi Fi Protected Access 2 If your network has the wireless security WPA2 Personal enabled this screen appears WPA2 Security Pre shared Key Enter a Pre shared Key of 8 63 characters in the Pre shared Key field Click Connect and proceed to Step 3 After the profile installs the Congratulations screen appears Click Co...

Page 11: ...e screen shows a choice of two wireless modes Select Infrastructure Mode if you want to connect to a wireless router or access point 3 4 Select Ad Hoc Mode if you want to connect to another wireless device directly without using a wireless router or access point Enter the Wireless Network Name for your network Wireless Mode Infrastructure Mode Use this mode if you want to connect to a wireless rou...

Page 12: ... have any non Linksys wireless products enter the WEP key manually on those products WEP Key The WEP key you enter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal characters For 128 bit encryption enter exactly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F 6 Advanced Users TX Key The default transmit key number is 1 ...

Page 13: ...return to the previous screen PEAP WPA Enterprise PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication server in the Server Name field this is optional From the Certificate drop down menu select the certificate you have installed to authenticate you on y...

Page 14: ...ication types EAP TLS and PEAP Authentication Select the authentication method your network is using EAP TLS or PEAP EAP TLS RADIUS EAP TLS If you selected EAP TLS enter the login name of your wireless network in the Login Name field Enter the name of the authentication server in the Server Name field this is optional From the Certificate drop down menu select the certificate you have installed to...

Page 15: ...hows the new settings Confirm New Settings To save the new settings click Save To edit the new settings click Back To exit the Advanced Setup through the Wireless Network Monitor click Exit The Congratulations screen appears next Click Finish Congratulations Congratulations The profile is successfully configured 7 8 ...

Page 16: ...ly Reinsert the Dual Band Wireless N Notebook Adapter into the notebook s PC Card slot I cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration Make sure that the notebook or desktop is powered on Make sure that the Dual Band Wireless N Notebook Adapter is configured with the same Wireless Network Name SSID and WEP settings as the other computers in the...

Page 17: ...z Typical Receive Sensitivity in dBm 802 11b 76dBm 10 Typical 802 11g 65dBm 10 Typical 802 11a 65dBm 10 Typical 802 11n 50dBm 10 for 5GHz Typical 802 11n 50dBm 10 for 2 4GHz Typical Antenna Gain in dBi 2 7dBi 2 4GHz 1 2dBi 5 0GHz Power Consumption TX 620 10mA RX 890 10mA Standby 580 10mA Security features WEP WPA Personal WPA2 Personal WPA WPA2 Enterprise Security key bits Up to 128 bit encryption...

Page 18: ...k Monitor NOTE For more information on Windows XP Wireless Zero Configuration refer to Windows Help After installing the Adapter the Windows XP Wireless Zero Configuration icon appears in your computer s system tray Double click the icon 1 Windows XP Wireless Zero Configuration Icon The screen that appears will show any available wireless network Select the network you want Click Connect If your n...

Page 19: ...ter the exact WEP key used by your access point Your wireless network will appear as Connected when your connection is active Wireless Network Connection For more information about wireless networking on a Windows XP computer click Start Help Support Enter the keyword wireless in the field provided and press the Enter key The installation of the Windows XP Wireless Configuration is complete 5 ...

Page 20: ...NOT PROHIBITED BY LAW IN NO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OFTHE THEORY OF LIABILITY INCLUDING NEGLIGENCE ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE PRODUCT INCLUDING ANY SOFTWARE EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES IN NO EVENT WILL ...

Page 21: ...é L émetteur ne doit pas être placé près d une autre antenne ou d un autre émetteur ou fonctionner avec une autre antenne ou un autre émetteur Safety Notices Caution To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product during an electrical storm There may...

Page 22: ...Evropská směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo mís...

Page 23: ...α από το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets...

Page 24: ... elavult berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking ...

Page 25: ... pomôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje odlag...

Reviews: