background image

Chapter2

Wireless Security Checklist

RangePlus Wreless Notebook Adapter

Chapter :  
Wreless Securty Checklst

Wireless  networks  are  convenient  and  easy  to  install,  so 
homes with high-speed Internet access are adopting them 
at a rapid pace. Because wireless networking operates by 
sending  information  over  radio  waves,  it  can  be  more 
vulnerable to intruders than a traditional wired network. 
Like signals from your cellular or cordless phones, signals 
from your wireless network can also be intercepted. Since 
you cannot physically prevent someone from connecting 
to your wireless network, you need to take some additional 
steps to keep your network secure. 

.  Change the default wreless  

  network name or SSID

Wireless  devices  have  a  default  wireless  network  name 
or  Service  Set  Identifier  (SSID)  set  by  the  factory.  This 
is  the  name  of  your  wireless  network,  and  can  be  up 
to  32  characters  in  length.  Linksys  wireless  products 
use 

lnksys

  as  the  default  wireless  network  name.  You 

should change the wireless network name to something 
unique  to  distinguish  your  wireless  network  from  other 
wireless networks that may exist around you, but do not 
use  personal  information  (such  as  your  Social  Security 
number)  because  this  information  may  be  available  for 
anyone to see when browsing for wireless networks. 

.  Change the default password

For wireless products such as access points and routers, 
you will be asked for a password when you want to change 
their settings. These devices have a default password set 
by  the  factory.  The  Linksys  default  password  is 

admn

Hackers  know  these  defaults  and  may  try  to  use  them 
to access your wireless device and change your network 
settings. To thwart any unauthorized changes, customize 
the device’s password so it will be hard to guess.

3.  Enable MAC address flterng

Linksys routers give you the ability to enable Media Access 
Control  (MAC)  address  filtering.  The  MAC  address  is  a 
unique  series  of  numbers  and  letters  assigned  to  every 
networking  device. With  MAC  address  filtering  enabled, 
wireless  network  access  is  provided  solely  for  wireless 
devices with specific MAC addresses. For example, you can 
specify the MAC address of each computer in your home 
so  that  only  those  computers  can  access  your  wireless 
network. 

4.  Enable encrypton

Encryption  protects  data  transmitted  over  a  wireless 
network. Wi-Fi  Protected  Access  (WPA/WPA2)  and Wired 
Equivalency Privacy (WEP) offer different levels of security 
for wireless communication.

A  network  encrypted  with  WPA/WPA2  is  more  secure 
than a network encrypted with WEP, because WPA/WPA2 
uses dynamic key encryption. To protect the information 
as  it  passes  over  the  airwaves,  you  should  enable  the 
highest  level  of  encryption  supported  by  your  network 
equipment. 

WEP  is  an  older  encryption  standard  and  may  be  the 
only option available on some older devices that do not 
support WPA.

General Network Security Guidelines

Wireless  network  security  is  useless  if  the  underlying 
network is not secure. 

Password  protect  all  computers  on  the  network  and 
individually password protect sensitive files.

Change passwords on a regular basis.

Install  anti-virus  software  and  personal  firewall 
software.

Disable file sharing (peer-to-peer). Some applications 
may  open  file  sharing  without  your  consent  and/or 
knowledge.

Additional Security Tips

Keep wireless routers, access points, or gateways away 
from exterior walls and windows.

Turn  wireless  routers,  access  points,  or  gateways 
off  when  they  are  not  being  used  (at  night,  during 
vacations).

Use strong passphrases that are at least eight characters 
in length. Combine letters and numbers to avoid using 
standard words that can be found in the dictionary. 

WEB:

  For  more  information  on  wireless 

security, visit 

www.lnksys.com/securty

Summary of Contents for WPC100 - Rangeplus Wireless G Pc Card

Page 1: ...USER GUIDE RangePlus Wireless Notebook Adapter Model No WPC100...

Page 2: ...mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser yo...

Page 3: ...3 Connect 4 Profiles 6 Appendix A Troubleshooting 13 Appendix B Specifications 14 Appendix C Windows XPWireless Zero Configuration 15 Windows XP Wireless Zero Configuration 15 Appendix D Warranty Info...

Page 4: ...ds of the wireless link use RangePlus technology the throughput can be increased even more by using twice as much radio band Once you re connected you can keep in touch with your e mail access the Int...

Page 5: ...Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every netwo...

Page 6: ...nd link quality information about the current connection It also provides a More Information button to click for additional status information Link Information Signal Strength The Signal Strength bar...

Page 7: ...after connecting to the wireless network or after clicking the Refresh button Driver Version This shows the Adapter s driver version Noise Level This shows the level of background noise that affects...

Page 8: ...se sensitive and must be 16 or fewer alphanumeric characters It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only For non Linksys w...

Page 9: ...ick Open Export Select the profile you want to save in a different location and click Export Direct Windows to the appropriate folder and click Save Delete Select the profile you want to delete and cl...

Page 10: ...he WEP key manually WEP Key The WEP key must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal characters 0 to 9 and A to F For 128 bit encryption enter exa...

Page 11: ...ings If your network does not have a DHCP server or router select this option and enter an IP Address Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP...

Page 12: ...WEP key is automatically generated It is case sensitive and should not be longer than 16 alphanumeric characters This passphrase must match the passphrase of your other wireless network devices and is...

Page 13: ...connected to the Router WPA Enterprise offers two authentication methods EAP TLS and PEAP as well as two encryption methods TKIP and AES with dynamic encryption keys Authentication Select the authenti...

Page 14: ...the following Login Name Enter the login name of your wireless network ServerName Enterthenameoftheauthenticationserver this is optional Certificate Select the certificate you have installed to authen...

Page 15: ...your wireless network ServerName Enterthenameoftheauthenticationserver this is optional Certificate Select the certificate you have installed to authenticate you on your wireless network if you want...

Page 16: ...sert the RangePlus Wireless Notebook Adapter into the notebook s PC Card slot I cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration Make sure that the n...

Page 17: ...5 dBm 802 11n 9dBm 17 dBm 1 5 dBm Receive Sensitivity in dBm 802 11b 88dBm 84 dBm 802 11g 88dBm 66 dBm 802 11n 85dBm 60 dBm Antenna Gain in dBi 2 dBi Power Consumption TX 360mA 410mA at 3 3V RX 340mA...

Page 18: ...Monitor NOTE For more information on Windows XP Wireless Zero Configuration refer to Windows Help After installing the Adapter the Windows XP Wireless Zero Configuration icon appears in your computer...

Page 19: ...r the exact WEP key used by your access point Your wireless network will appear as Connected when your connection is active Wireless Network Connection For more information about wireless networking o...

Page 20: ...NG ANY IMPLIED WARRANTY OF NON INFRINGEMENT AREDISCLAIMED Somejurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gi...

Page 21: ...with minimum distance 20cm between the radiator and your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter IEEE 802 11b or 802 11g operatio...

Page 22: ...ce a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho s...

Page 23: ...de jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination...

Page 24: ...ek felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederland...

Page 25: ...br ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj ce...

Reviews: