background image

Chapter 2

Wireless Security Checklist

4

Compact Wireless-G USB Adapter

Chapter 2:  
Wireless Security Checklist

Wireless  networks  are  convenient  and  easy  to  install,  so 
homes with high-speed Internet access are adopting them 
at a rapid pace. Because wireless networking operates by 
sending  information  over  radio  waves,  it  can  be  more 
vulnerable to intruders than a traditional wired network. 
Like signals from your cellular or cordless phones, signals 
from your wireless network can also be intercepted. Since 
you cannot physically prevent someone from connecting 
to your wireless network, you need to take some additional 
steps to keep your network secure. 

1.  Change the default wireless  

  network name or SSID

Wireless  devices  have  a  default  wireless  network  name 
or  Service  Set  Identifier  (SSID)  set  by  the  factory.  This 
is  the  name  of  your  wireless  network,  and  can  be  up 
to  32  characters  in  length.  Linksys  wireless  products 
use 

linksys

  as  the  default  wireless  network  name.  You 

should change the wireless network name to something 
unique  to  distinguish  your  wireless  network  from  other 
wireless networks that may exist around you, but do not 
use  personal  information  (such  as  your  Social  Security 
number)  because  this  information  may  be  available  for 
anyone to see when browsing for wireless networks. 

2.  Change the default password

For wireless products such as access points, routers, and 
gateways,  you  will  be  asked  for  a  password  when  you 
want to change their settings. These devices have a default 
password set by the factory. The Linksys default password 
is 

admin

.  Hackers  know  these  defaults  and  may  try  to 

use them to access your wireless device and change your 
network  settings.  To  thwart  any  unauthorized  changes, 
customize  the  device’s  password  so  it  will  be  hard  to 
guess.

3.  Enable MAC address filtering

Linksys  routers  and  gateways  give  you  the  ability  to 
enable Media Access Control (MAC) address filtering. The 
MAC  address  is  a  unique  series  of  numbers  and  letters 
assigned to every networking device. With MAC address 
filtering  enabled,  wireless  network  access  is  provided 
solely  for  wireless  devices  with  specific  MAC  addresses. 
For  example,  you  can  specify  the  MAC  address  of  each 
computer in your home so that only those computers can 
access your wireless network. 

4.  Enable encryption

Encryption  protects  data  transmitted  over  a  wireless 
network. Wi-Fi  Protected  Access  (WPA/WPA2)  and Wired 
Equivalency Privacy (WEP) offer different levels of security 
for wireless communication.

A  network  encrypted  with  WPA/WPA2  is  more  secure 
than a network encrypted with WEP, because WPA/WPA2 
uses dynamic key encryption. To protect the information 
as  it  passes  over  the  airwaves,  you  should  enable  the 
highest  level  of  encryption  supported  by  your  network 
equipment. 

WEP  is  an  older  encryption  standard  and  may  be  the 
only option available on some older devices that do not 
support WPA.

General Network Security Guidelines

Wireless  network  security  is  useless  if  the  underlying 
network is not secure. 

Password  protect  all  computers  on  the  network  and 

 

individually password protect sensitive files.

Change passwords on a regular basis.

 

Install  anti-virus  software  and  personal  firewall 

 

software.

Disable file sharing (peer-to-peer). Some applications 

 

may  open  file  sharing  without  your  consent  and/or 
knowledge.

Additional Security Tips

Keep wireless routers, access points, or gateways away 

 

from exterior walls and windows.

Turn  wireless  routers,  access  points,  or  gateways 

 

off  when  they  are  not  being  used  (at  night,  during 
vacations).

Use strong passphrases that are at least eight characters 

 

in length. Combine letters and numbers to avoid using 
standard words that can be found in the dictionary. 

WEB:

  For  more  information  on  wireless 

security, visit 

www.linksys.com/security

Содержание LINKSYS WUSB54GC

Страница 1: ...USER GUIDE Compact Wireless G USB Adapter Model WUSB54GC EU ...

Страница 2: ...address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network Se...

Страница 3: ... FCC Radiation Exposure Statement 15 Safety Notices 15 Industry Canada Statement 16 Règlement d Industry Canada 16 Wireless Disclaimer 16 Avis de non responsabilité concernant les appareils sans fil 16 Declaration of Conformity with Regard to EU Directive 1999 5 EC R TTE Directive 17 Wireless Equipment Wireless N G A B Products 18 CE Marking 18 National Restrictions 18 Product Usage Restrictions 1...

Страница 4: ...USB port leaving your PC s slots available for other purposes The Adapter also lets you connect with any of the growing number of wireless hotspots in public places such as coffee shops airports hotels and convention centers With this Adapter your wireless networking experience can be faster and easier than ever LEDs Link Green The LED flashes when there is wireless network activity ...

Страница 5: ...able MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of ea...

Страница 6: ...ss Manager The Wireless Manager opens with the Connect to a Wireless Network screen This screen allows you to connect to a wireless network or to disconnect from a wireless network When the Connect to a Wireless Network screen first appears it displays a message indicating that the Wireless Manager is searching for wireless networks within range When the search is complete the screen then displays...

Страница 7: ...Wireless Network page 7 If your wireless network supports Wi Fi Protected Setup 2 the icon appears next to the network s name go to How to Connect Using Wi Fi Protected Setup page 8 Select your network and then click 3 Connect Select a Wireless Network If the wireless network uses wireless security enter the 4 security key and then click Next to continue Enter Wireless Network s Security Key The 5...

Страница 8: ...f you want to connect to a hidden 2 network If your network is hidden select Connect to hidden network and then click Next Confirm Connection to Hidden Network NOTE If your wireless network is NOT hidden select My Network is not hidden and then click Next Follow the instructions on the next screen verifythatyournetworkrouteristurned on and is within range of the Adapter and then click Retry to sea...

Страница 9: ...ct to a Wireless Network screen the Wi Fi ProtectedSetupicon indicatesanetworkthatsupports Wi Fi Protected Setup Follow these instructions to connect to a wireless network using Wi Fi Protected Setup NOTE Before you begin make sure the router and the computer with the Adapter are in the same room Select your network in the 1 Connect to a Wireless Network screen and then click Connect Select the Wi...

Страница 10: ...anager Connected to Your Network Congratulations The Adapter is connected to the network Enter the Adapter s PIN Number Enter the PIN Number Access the web based utility of the router Refer to the 1 router s documentation for instructions On the router s 2 Wi Fi Protected Setup screen enter the Adapter s PIN number in the appropriate field Then perform the appropriate action to save the PIN number...

Страница 11: ...e View drop down menu of the Connect to a Wireless Network screen Saved Networks To delete a saved network form the list select the network and click Remove To change a network s position in the list select the network and click Move up or Move down How to Connect to a Saved Network To connect to a saved network follow these instructions In the 1 Connect to a Wireless Network screen select Saved n...

Страница 12: ...ert it into the computer s USB slot Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration Make sure that the computers are powered on 1 Make sure that the Adapter is configured with the 2 same Wireless Network Name SSID and wireless security settings as the other wireless computers in the Infrastructure configuration WEB If your questions...

Страница 13: ...02 11g OFDM Transmitted Power 802 11b 17 1 5 dBm Typical 802 11g 14 1 5 dBm Typical Receive Sensitivity 11 Mbps 87 dBm Typical 54 Mbps 71 dBm Typical Security Features WEP and WPA Encryption WEP Key Bits 64 bit and 128 bit Environmental Dimensions 21 1 x 73 6 x 9 7 mm Weight 10 g Certifications FCC Wi Fi 802 11b g Wi Fi Protected Setup WPS Certified Windows Vista Certified Operating Temp 0 to 40ºC...

Страница 14: ...duct or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party software or service offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require ...

Страница 15: ...vered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com support General This limited warranty is governed by the laws of the jurisdicti...

Страница 16: ... FCC Rules Operation is subject to the following two conditions 1 Thisdevicemaynotcauseharmfulinterference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment End users mustfollowthespecificoperatinginstr...

Страница 17: ...Ce matériel est conforme aux limites d exposition aux radiofréquences établies pour un environnement non contrôlé Pour assurer le maintien de cette conformité l utilisateur doit suivre les consignes d utilisation décrites dans le présent manuel Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specifications Actual performance can vary including lower wi...

Страница 18: ... tenkina 1999 5 EB Direktyvos esminius reikalavimus ir kitas šios direktyvos nuostatas Nederlands Dutch Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ħtiġiet essenzjali u l provedimenti l oħra rilevanti tad Direttiva 1999 5 EC Magyar Hungarian Ez a készülék teljesíti az alapvető követ...

Страница 19: ...s ci dessous Questo prodotto è utilizzabile in tutte i paesi EU ed in tutti gli altri paesi che seguono le direttive EU 1999 5 EC senza nessuna limitazione eccetto per i paesi menzionati di seguito DasProduktkanninallenEUStaatenohneEinschränkungen eingesetzt werden sowie in anderen Staaten die der EU Direktive 1999 5 CE folgen mit Außnahme der folgenden aufgeführten Staaten In the majority of the ...

Страница 20: ...ximum output power are 2 specified in EIRP The EIRP level of a device can be calculated by adding the gain of the antenna used specified in dBi to the output power available at the connector specified in dBm Product Usage Restrictions This product is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use with the...

Страница 21: ...měrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřad...

Страница 22: ... οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des mén...

Страница 23: ...erendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagwor...

Страница 24: ...iť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje opreme s te...

Страница 25: ...YS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART OF AN...

Страница 26: ...ou fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE INCLUDI...

Страница 27: ...y To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be distributed...

Страница 28: ...s of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work me...

Страница 29: ...Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by ...

Страница 30: ... for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effe...

Страница 31: ...s You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library Y...

Страница 32: ...Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Wh...

Страница 33: ...opy modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such partie...

Страница 34: ... generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A...

Страница 35: ...cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 EricYoung eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is free for com...

Страница 36: ...WEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distribution...

Отзывы: