background image

Chapter2

Wireless Security Checklist

Wreless-G Router for Moble Broadband

Chapter 2:  

Wreless Securty Checklst

Wireless networks are convenient and easy to install, so 

homes with high-speed Internet access are adopting them 

at a rapid pace. Because wireless networking operates by 

sending  information  over  radio  waves,  it  can  be  more 

vulnerable to intruders than a traditional wired network. 

Like signals from your cellular or cordless phones, signals 

from your wireless network can also be intercepted. Since 

you cannot physically prevent someone from connecting 

to your wireless network, you need to take some additional 

steps to keep your network secure. 

1.  Change the default wreless  

  network name or SSID

Wireless  devices  have  a  default  wireless  network  name 

or  Service  Set  Identifier  (SSID)  set  by  the  factory.  This 

is  the  name  of  your  wireless  network,  and  can  be  up 

to  32  characters  in  length.  Linksys  wireless  products 

use 

lnksys

  as  the  default  wireless  network  name.  You 

should change the wireless network name to something 

unique  to  distinguish  your  wireless  network  from  other 

wireless networks that may exist around you, but do not 

use  personal  information  (such  as  your  Social  Security 

number)  because  this  information  may  be  available  for 

anyone to see when browsing for wireless networks. 

2.  Change the default password

For wireless products such as access points, routers, and 

gateways,  you  will  be  asked  for  a  password  when  you 

want to change their settings. These devices have a default 

password set by the factory. The Linksys default password 

is 

admn

.  Hackers  know  these  defaults  and  may  try  to 

use them to access your wireless device and change your 

network  settings.  To  thwart  any  unauthorized  changes, 

customize  the  device’s  password  so  it  will  be  hard  to 

guess.

3.  Enable MAC address flterng

Linksys  routers  and  gateways  give  you  the  ability  to 

enable Media Access Control (MAC) address filtering. The 

MAC  address  is  a  unique  series  of  numbers  and  letters 

assigned to every networking device. With MAC address 

filtering  enabled,  wireless  network  access  is  provided 

solely  for  wireless  devices  with  specific  MAC  addresses. 

For  example,  you  can  specify  the  MAC  address  of  each 

computer in your home so that only those computers can 

access your wireless network. 

.  Enable encrypton

Encryption  protects  data  transmitted  over  a  wireless 

network. Wi-Fi Protected Access (WPA/WPA2) and Wired 

Equivalency Privacy (WEP) offer different levels of security 

for wireless communication.
A  network  encrypted  with  WPA/WPA2  is  more  secure 

than a network encrypted with WEP, because WPA/WPA2 

uses dynamic key encryption. To protect the information 

as  it  passes  over  the  airwaves,  you  should  enable  the 

highest  level  of  encryption  supported  by  your  network 

equipment. 

WEP  is  an  older  encryption  standard  and  may  be  the 

only option available on some older devices that do not 

support WPA.

General Network Security Guidelines

Wireless  network  security  is  useless  if  the  underlying 

network is not secure. 

Password  protect  all  computers  on  the  network  and 

individually password protect sensitive files.
Change passwords on a regular basis.
Install  anti-virus  software  and  personal  firewall 

software.
Disable file sharing (peer-to-peer). Some applications 

may  open  file  sharing  without  your  consent  and/or 

knowledge.

Additional Security Tips

Keep wireless routers, access points, or gateways away 

from exterior walls and windows.
Turn  wireless  routers,  access  points,  or  gateways 

off  when  they  are  not  being  used  (at  night,  during 

vacations).
Use strong passphrases that are at least eight characters 

in length. Combine letters and numbers to avoid using 

standard words that can be found in the dictionary. 

WEB:

  For  more  information  on  wireless 

security, visit 

www.lnksys.com/securty

Summary of Contents for Linksys WRT54G3GV2-ST

Page 1: ...USER GUIDE Wireless G Router for Mobile Broadband Model No WRT54G3GV2 ST ...

Page 2: ...ress Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Sprint www sprint com Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network S...

Page 3: ...ss Security 15 Wireless Wireless MAC Filter 17 Wireless Advanced Wireless Settings 18 Security Firewall 19 Security VPN 19 Access Restrictions Internet Access 23 Applications and Gaming Single Port Forwarding 24 Applications and Gaming Port Range Forwarding 24 Applications Gaming Port Range Triggering 25 Applications and Gaming DMZ 25 Applications and Gaming QoS 26 Administration Management 28 Adm...

Page 4: ...ices 37 Industry Canada Statement 37 Avis d Industrie Canada 38 Wireless Disclaimer 38 Avis de non responsabilité concernant les appareils sans fil 38 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 39 Appendix E Contact Information 43 Sprint Online Resource 43 Sprint Technical Support 43 ...

Page 5: ...nect to and disconnect from the mobile network You can also use the Basic Setup screen of the Router s web based utility Side Panel USB Port Reserved for future use Power Green The Power LED lights up and stays on while the Router is powered on Ethernet 1 4 Green These numbered LEDs corresponding with the numbered ports on the Router s back panel serve two purposes If the LED is continuously lit t...

Page 6: ... using the security slot Bottom Panel To place the Router in a vertical position rotate the stand 90 degrees Placement Positions There are three ways to physically install the Router The first way is to place the Router horizontally on a surface The second way is to stand the Router vertically on a surface The third way is to mount the Router on a wall Horizontal Placement The Router has four rubb...

Page 7: ...ns Determine where you want to mount the Router Make sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet Drill two holes into the wall Make sure the holes are 68 mm 2 68 inches apart Insert a screw into each hole and leave 3 mm 0 12 inches of its head exposed Maneuver the Router so two of the wall mount slots line up with the...

Page 8: ... Enable MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of...

Page 9: ...enter the Router s default IP address 192 168 1 1 in the Address field Then press Enter A login screen will appear Non Windows XP users will see a similar screen Enter admin the default in both the User nameand Password fields You can set a new password on the Administration tab s Management screen Click OK to continue Login Screen Setup Basic Setup The first screen that appears is the Basic Setup...

Page 10: ...tion the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds PPTP Point to Point Tunneling Protocol PPTP is a service that applies to...

Page 11: ...eaving these fields blank will work MTU MTU is the Maximum Transmission Unit It specifies the largest packet size permitted for Internet transmission Select Manual if you want to manually enter the largest packet size that is transmitted To have the Router select the best MTU for your Internet connection keep the default Auto Size When Manual is selected in the MTU field this option is enabled Lea...

Page 12: ...e 192 168 1 2 or greater but smaller than 192 168 1 253 The default is 192 168 1 100 Maximum Number of Users Enter the maximum number of PCs that you want the DHCP server to assign IP addresses to This number cannot be greater than 253 The default is 50 IPAddressRange Displayedhereistherangeofavailable IP addresses Client Lease Time The Client Lease Time is the amount of time a network user will b...

Page 13: ...Redial Period field specify howoftenyouwanttheRoutertocheckthemobilenetwork connection The default Redial Period is 30 seconds ICMP To use the default Network Time Protocol NTP server keep the default NTP To use a different time server select Custom and enter its IP address Mobile Network Status Network Name The name of the mobile network the Router uses is displayed Signal Strength The strength o...

Page 14: ...he Router s Internet IP address is displayed here Because it is dynamic it will change Status The status of the DDNS service connection is displayed here Update To manually trigger an update click this button Click Save Settings to apply your changes or click Cancel Changes to cancel your changes TZO com Setup DDNS TZO E mail Address TZO Key and Domain Name Enter the settings of the account you se...

Page 15: ... the Dynamic Routing feature Static Routing A static route is a pre determined pathway that network informationmusttraveltoreachaspecifichostornetwork Enter the information described below to set up a new static route Route Entries To set up a static route between the Router and another network select a number from the drop down list Click Delete This Entry to delete a static route Enter Route Nam...

Page 16: ...less Security The Wireless Security screen configures the security of your wireless network There are six wireless security mode options supported by the Router WPA Personal WPA2 Personal WPA Enterprise WPA2 Enterprise RADIUS and WEP WPA stands for Wi Fi Protected Setup which is a security method stronger than WEP encryption WEP stands for Wired Equivalent Privacy while RADIUS stands for Remote Au...

Page 17: ...cryption WPA2 supports two encryption methods TKIP and AES with dynamic encryption keys Select the type of algorithm AES or AES or TKIP The default is AES or TKIP RADIUS Server Enter the IP address of the RADIUS server RADIUS Port Enter the port number of the RADIUS server The default is 1812 Shared Secret Enter the key shared between the Router and the server Key Renewal Enter a Key Renewal perio...

Page 18: ...The default is 1 Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Wireless Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network s radius Wireless Wireless MAC Filter Wireless MAC Filter Enabled Disabled To filter wireless users by MAC Address either permitting or blocking acce...

Page 19: ...ransmission The default is Default when the Router can transmit at all standard wireless rates 1 2Mbps 5 5Mbps 11Mbps 18Mbps and 24Mbps Other options are 1 2Mbps for use with older wireless technology and All when the Router can transmit at all wireless rates The Basic Rate is not the actual rate of data transmission If you want to specify the Router s rate of data transmission configure the Trans...

Page 20: ...lect this feature to filter multicasting This feature is not selected by default Filter Internet NAT Redirection This feature uses port forwarding to block access to local servers from local networked computers Select this feature to filter Internet NAT redirection It is not selected by default Filter IDENT Port 113 This feature keeps port 113 from being scanned by devices outside of your local ne...

Page 21: ... and Security Method of the VPN tunnels Click Refresh to update the information VPN VPN Settings Summary IPSec VPN Tunnel Select Enabled to enable the IPSec VPN tunnel Tunnel Name Enter a descriptive name This lets you identify multiple tunnels and does not have to match the name used at the other end of the tunnel Local Secure Group TheLocalSecureGroupisthecomputer s onyournetwork that can access...

Reviews: