background image

Wireless Security Checklist

Wreless-G Busness Ethernet Brdge

Appendx A

Appendx A:  

Wreless Securty Checklst

Wireless networks are convenient and easy to install, so 

homes with high-speed Internet access are adopting them 

at a rapid pace. Because wireless networking operates by 

sending  information  over  radio  waves,  it  can  be  more 

vulnerable to intruders than a traditional wired network. 

Like signals from your cellular or cordless phones, signals 

from your wireless network can also be intercepted. Since 

you cannot physically prevent someone from connecting 

to your wireless network, you need to take some additional 

steps to keep your network secure. 

.  Change the default wreless  

  network name or SSID

Wireless  devices  have  a  default  wireless  network  name 

or  Service  Set  Identifier  (SSID)  set  by  the  factory.  This 

is  the  name  of  your  wireless  network,  and  can  be  up 

to  32  characters  in  length.  Linksys  wireless  products 

use 

lnksys

  as  the  default  wireless  network  name.  You 

should change the wireless network name to something 

unique  to  distinguish  your  wireless  network  from  other 

wireless networks that may exist around you, but do not 

use  personal  information  (such  as  your  Social  Security 

number)  because  this  information  may  be  available  for 

anyone to see when browsing for wireless networks. 

.  Change the default password

For wireless products such as access points and routers, 

you will be asked for a password when you want to change 

their settings. These devices have a default password set 

by  the  factory.  The  Linksys  default  password  is 

admn

Hackers  know  these  defaults  and  may  try  to  use  them 

to access your wireless device and change your network 

settings. To thwart any unauthorized changes, customize 

the device’s password so it will be hard to guess.

.  Enable MAC address flterng

Linksys routers give you the ability to enable Media Access 

Control  (MAC)  address  filtering.  The  MAC  address  is  a 

unique  series  of  numbers  and  letters  assigned  to  every 

networking  device. With  MAC  address  filtering  enabled, 

wireless  network  access  is  provided  solely  for  wireless 

devices with specific MAC addresses. For example, you can 

specify the MAC address of each computer in your home 

so  that  only  those  computers  can  access  your  wireless 

network. 

.  Enable encrypton

Encryption  protects  data  transmitted  over  a  wireless 

network. Wi-Fi Protected Access (WPA/WPA2) and Wired 

Equivalency Privacy (WEP) offer different levels of security 

for  wireless  communication.  Currently,  devices  that  are 

Wi-Fi certified are required to support WPA2, but are not 

required to support WEP.
A  network  encrypted  with  WPA/WPA2  is  more  secure 

than a network encrypted with WEP, because WPA/WPA2 

uses dynamic key encryption. To protect the information 

as  it  passes  over  the  airwaves,  you  should  enable  the 

highest  level  of  encryption  supported  by  your  network 

equipment. 

WEP  is  an  older  encryption  standard  and  may  be  the 

only option available on some older devices that do not 

support WPA.

General Network Security Guidelines

Wireless  network  security  is  useless  if  the  underlying 

network is not secure. 

Password  protect  all  computers  on  the  network  and 

individually password protect sensitive files.
Change passwords on a regular basis.
Install  anti-virus  software  and  personal  firewall 

software.
Disable file sharing (peer-to-peer). Some applications 

may  open  file  sharing  without  your  consent  and/or 

knowledge.

Additional Security Tips

Keep wireless routers, access points, or gateways away 

from exterior walls and windows.
Turn  wireless  routers,  access  points,  or  gateways 

off  when  they  are  not  being  used  (at  night,  during 

vacations).
Use strong passphrases that are at least eight characters 

in length. Combine letters and numbers to avoid using 

standard words that can be found in the dictionary. 

Summary of Contents for WET200 - Wireless-G Business Ethernet Bridge

Page 1: ...USER GUIDE BUSINESS SERIES Wireless G Business Ethernet Bridge Model WET200 EU...

Page 2: ...ddress or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web...

Page 3: ...ver Ethernet 5 Power Adapter 5 Placement Options 5 Stand Option 5 Wall Mount Option 6 Chapter 5 Quick Configuration Overview 7 Overview 7 Accessing the Web Based Utility 7 Navigating the Web Based Uti...

Page 4: ...ns 27 Appendix C Warranty Information 28 Appendix E Regulatory Information 29 FCC Statement 29 FCC Radiation Exposure Statement 29 Safety Notices 29 Industry Canada Statement 29 Industry Canada Radiat...

Page 5: ...tlet PoE enables delivery of both data and power to the WET200 An AC adapter is also included if the device installation site has a power outlet nearby Advanced security features include Wi Fi Protect...

Page 6: ...an access point is able to forward data within a network the effective transmission range in an infrastructure network may be doubled depending on antenna characteristics Network Layout The Wireless G...

Page 7: ...shows three wired networks Office One Office Two and Office Three each with a direct connection to the other wired networks via an Ad Hoc network connection The Bridge in Office One is connected to a...

Page 8: ...ge Back Panel RESET Press and hold the Reset button for approximately ten seconds to reset the Bridge to the factory default settings ETHERNET 1 5 These RJ 45 ports support networkspeedsofeither10 Mbp...

Page 9: ...ed to the section Placement Options 1 2 3 Power Adapter Connect one end of an Ethernet network cable to the LAN port on your PC then connect the other end to Ethernet port 1 2 3 4 or 5 on the Bridge C...

Page 10: ...e s back panel are two crisscross wall mount slots 73 mm Wall Mount Slots on Bridge s Back Panel Determine where you want to mount the Bridge and install two screws that are 73 mm apart Line up the Br...

Page 11: ...ested information such as passphrase or shared secret The wireless bridge will now be connected to the access point Accessing theWeb Based Utility To access the web based utility perform these steps C...

Page 12: ...tings Administration You use the Administration tabs to manage the Bridge Password Use this screen to change the password SNMP This screen is used to enter the Simple Network Management Protocol SNMP...

Page 13: ...able names are helpful The default name is WET200 Contact Enter the name of the administrator responsible for the system Location This field is used for entering a description of where the Bridge is l...

Page 14: ...of the other devices in your wireless network If you are using Infrastructure mode this should match your Access Point s channel number If you are using Ad Hoc mode this should match your peer device...

Page 15: ...assphrase is used to generate one or more WEP keys It is case sensitive and should not be longer than 16 alphanumeric characters The Passphrase function is compatible with Linksys wireless products on...

Page 16: ...ntication The Login Name and Private Key Password are used to decrypt the certificate file Encryption Select either TKIP default or AES encryption Login Name Enter your login name for the RADIUS serve...

Page 17: ...reless equipped device RTSThreshold Thisdetermineshowlargeapacketcanbe before the Bridge coordinates transmission and reception to ensure efficient communication It should remain at its default settin...

Page 18: ...m any port including wireless to Port 1 for real time analysis This can be helpful for troubleshooting purposes Switch Port Mirroring If this feature is enabled Port 1 will only be able to communicate...

Page 19: ...IDs that are configured in the port s membership table This option is not selected by default The following summarizes 802 1QVLAN operation when a packet is received on a port If the packet has an 802...

Page 20: ...urce MAC addresses that is used to grant or deny access If a packet passes from the wireless port to a LAN port or vice versa the Bridge will check if the packet s source MAC address matches any entry...

Page 21: ...interact with other bridging devices that is an STP compliant switch bridge or router in your network to ensure that only one route exists between any two stations on the network and provide backup li...

Page 22: ...s and click Add New Entry The new entry will then appear in the Status Address Table list Note that static MAC entries are not affected by the Age timer and can only be deleted manually Static Addres...

Page 23: ...nity Enter the name of your Get community Set Community Enter the name of your Set community SNMP Trap Community Enter the name of your Trap community SNMP Trusted Host Enter the IP address of your Tr...

Page 24: ...on information These screens only display information and cannot be used to change any settings System Status System Status This is the System Status tab s default screen It displays basic status info...

Page 25: ...connection Click Refresh to display the most current information System Status Port Statistics System Status Port Statistics This screen displays status information for the Bridge s ports Port 1 5 Wi...

Page 26: ...dress filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device...

Page 27: ...is assigned to the lowest priority queue and packet delivery is not guaranteed Bit A binary digit Boot To start a device and cause it to start executing instructions Browser An application program th...

Page 28: ...peed device refraining from sending packets FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Full Duplex The ability of a networking device to receive and transmit da...

Page 29: ...agers to decide how and what network traffic is forwarded according to priorities application types and source and destination addresses RADIUS Remote Authentication Dial In User Service A protocol th...

Page 30: ...smission Rate UDP User Data Protocol Communication protocol that transmits packets but does not guarantee their delivery Upgrade To replace existing software or firmware with a newer version Upload To...

Page 31: ...els Operating Channels 11 North America 13 Most of Europe ETSI and Japan Internal Antennas None External Antennas 2 Omnidirectional SMA Detachable Transmit Power Transmit Power Adjustable Normal Tempe...

Page 32: ...E DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may al...

Page 33: ...B digital apparatus complies with Canadian ICES 003 and RSS210 Operation is subject to the following two conditions This device may not cause interference and This device must accept any interference...

Page 34: ...paraat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ti iet essenzjali u l provedimenti l o ra ril...

Page 35: ...en sowie in anderen Staaten die der EU Direktive 1999 5 CE folgen mit Au nahme der folgenden aufgef hrten Staaten In the majority of the EU and other European countries the 2 4 and 5 GHz bands have be...

Page 36: ...ct is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use with the standard integral or dedicated external ante...

Page 37: ...ce a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho s...

Page 38: ...de jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination...

Page 39: ...ek felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederland...

Page 40: ...br ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj ce...

Page 41: ...www linksys com DK support Dominican Republic www linksys com DO support Ecuador www linksys com EC support Egypt Arabic www linksys com EGar support Region Web Address Egypt English www linksys com...

Page 42: ...ksys com QAar support Qatar English www linksys com QAen support Rom nia www linksys com RO support Russia www linksys com RU support Saudi Arabia Arabic www linksys com SAar support Region Web Addres...

Reviews: