background image

Chapter 2

Wireless Security Checklist

3

Wireless ADSL2+ Gateway

Chapter 2:  

Wireless Security Checklist

Wireless networks are convenient and easy to install, so 

homes with high-speed Internet access are adopting them 

at a rapid pace. Because wireless networking operates by 

sending  information  over  radio  waves,  it  can  be  more 

vulnerable to intruders than a traditional wired network. 

Like signals from your cellular or cordless phones, signals 

from your wireless network can also be intercepted. Since 

you cannot physically prevent someone from connecting 

to your wireless network, you need to take some additional 

steps to keep your network secure. 

1.  Change the default wireless  

  network name or SSID

Wireless  devices  have  a  default  wireless  network  name 

or  Service  Set  Identifier  (SSID)  set  by  the  factory.  This 

is  the  name  of  your  wireless  network,  and  can  be  up 

to  32  characters  in  length.  Linksys  wireless  products 

use 

linksys

  as  the  default  wireless  network  name.  You 

should change the wireless network name to something 

unique  to  distinguish  your  wireless  network  from  other 

wireless networks that may exist around you, but do not 

use  personal  information  (such  as  your  Social  Security 

number)  because  this  information  may  be  available  for 

anyone to see when browsing for wireless networks. 

2.  Change the default password

For wireless products such as access points, routers, and 

gateways,  you  will  be  asked  for  a  password  when  you 

want to change their settings. These devices have a default 

password set by the factory. The Linksys default password 

is 

admin

.  Hackers  know  these  defaults  and  may  try  to 

use them to access your wireless device and change your 

network  settings.  To  thwart  any  unauthorized  changes, 

customize  the  device’s  password  so  it  will  be  hard  to 

guess.

3.  Enable MAC address filtering

Linksys  routers  and  gateways  give  you  the  ability  to 

enable Media Access Control (MAC) address filtering. The 

MAC  address  is  a  unique  series  of  numbers  and  letters 

assigned to every networking device. With MAC address 

filtering  enabled,  wireless  network  access  is  provided 

solely  for  wireless  devices  with  specific  MAC  addresses. 

For  example,  you  can  specify  the  MAC  address  of  each 

computer in your home so that only those computers can 

access your wireless network. 

4.  Enable encryption

Encryption  protects  data  transmitted  over  a  wireless 

network. Wi-Fi Protected Access (WPA/WPA2) and Wired 

Equivalency Privacy (WEP) offer different levels of security 

for wireless communication.
A  network  encrypted  with  WPA/WPA2  is  more  secure 

than a network encrypted with WEP, because WPA/WPA2 

uses dynamic key encryption. To protect the information 

as  it  passes  over  the  airwaves,  you  should  enable  the 

highest  level  of  encryption  supported  by  your  network 

equipment. 

WEP  is  an  older  encryption  standard  and  may  be  the 

only option available on some older devices that do not 

support WPA.

General Network Security Guidelines

Wireless  network  security  is  useless  if  the  underlying 

network is not secure. 

Password  protect  all  computers  on  the  network  and 

 

individually password protect sensitive files.
Change passwords on a regular basis.

 

Install  anti-virus  software  and  personal  firewall 

 

software.
Disable file sharing (peer-to-peer). Some applications 

 

may  open  file  sharing  without  your  consent  and/or 

knowledge.

Additional Security Tips

Keep wireless routers, access points, or gateways away 

 

from exterior walls and windows.
Turn  wireless  routers,  access  points,  or  gateways 

 

off  when  they  are  not  being  used  (at  night,  during 

vacations).
Use strong passphrases that are at least eight characters 

 

in length. Combine letters and numbers to avoid using 

standard words that can be found in the dictionary. 

WEB:

  For  more  information  on  wireless 

security, visit 

www.linksys.com/security

Содержание WAG110

Страница 1: ...USER GUIDE Wireless ADSL2 Gateway Models WAG54G2 WAG200G WAG110 WAG160N...

Страница 2: ...website address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an...

Страница 3: ...Appendix B Specifications 7 Appendix C Warranty Information 9 Limited Warranty Europe Middle East Africa Latin America 9 Limited Warranty India Indonesia Malaysia Phillipines Singapore Thailand Vietna...

Страница 4: ...reless network and its security settings For more information refer to Wireless Basic Wireless Settings in the Advanced Configuration chapter Wireless Green The Wireless LED lights up when the wireles...

Страница 5: ...the device so the wall mount slots line up 4 with the two screws Place the wall mount slots over the screws and slide 5 the device down until the screws fit snugly into the wall mount slots Wall Mount...

Страница 6: ...MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every...

Страница 7: ...or splitter between the phone cableandwalljack ContactyourISPtodetermine if one is required UK residents need to connect the microfilter to the wall phone jack with ADSL serviceandthenconnectoneendoft...

Страница 8: ...apter NOTE ForNewZealand followtheseinstructions after accessing the web based utility in the Setup Basic Setup screen Select 1 RFC 2364 PPPoA from the Encapsulation drop down menu For the Virtual Cir...

Страница 9: ...e steps are specific to Internet Explorer but are similar for other browsers Select 1 Tools Internet Options Click the 2 Connections tab Select 3 Never dial a connection Click 4 OK You are using a sta...

Страница 10: ...ge Humidity 5 to 90 Noncondensing Model WAG200G Standards IEEE 802 11g IEEE 802 11b IEEE 802 3u IEEE 802 3 g 992 1 g dmt g 992 2 g lite g 992 3 g 992 5 T1 413i2 U R2 for Annex B Ports Line or DSL Ethe...

Страница 11: ...densing Model Number WAG160N Standards Draft 802 11N IEEE 802 11g IEEE 802 11b IEEE 802 3u g 992 1 g dmt g 992 2 g lite g 992 3 g 992 5 T1 413i2 Issue 2 U R2 for Annex B Ports Power DSL Ethernet 1 4 B...

Страница 12: ...ervice software or any equipment system or network on which the product or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party...

Страница 13: ...iod specified below Two 2 years for new product Ninety 90 days for refurbished product This limited warranty is non transferable and extends only to the original end user purchaser Your exclusive reme...

Страница 14: ...online support tools and information to assist you with your product For instructionsonhowtoobtainwarrantyserviceintheevent your product proves defective during theWarranty Period contact the Service...

Страница 15: ...or removed or g the product is supplied or licensed for beta evaluation testing or demonstration purposes for which Linksys does not charge a purchase price or license fee AllsoftwareprovidedbyLinksy...

Страница 16: ...rent rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support...

Страница 17: ...e number If requested this information must be provided to the telephone company This equipment uses the following USOC Jack RJ 11 An FCC compliant telephone cord and modular plug is provided with thi...

Страница 18: ...ype and its gain should be so chosen that the EIRP is not more than required for successful communication Industry Canada Radiation Exposure Statement This equipment complies with IC radiation exposur...

Страница 19: ...roduct within the European Union Declaration of Conformity with Regard to EU Directive 1999 5 EC R TTE Directive Compliance Information for 2 4 GHz and 5 GHz Wireless ProductsRelevanttotheEUandOtherCo...

Страница 20: ...raven och andra relevanta best mmelser i Direktiv 1999 5 EC For all products the Declaration of Conformity DofC is available through one or more of these options A pdf file is included on the product...

Страница 21: ...d 5150 5350 MHz is also allowed for outdoor usage I Danmark m frekvensb ndet 5150 5350 ogs anvendes udend rs France For 2 4 GHz the product should not be used outdoors in the band 2454 2483 5 MHz Ther...

Страница 22: ...3 Products tab Select the appropriate product category 4 Select the product sub category if necessary 5 Select the product 6 Select the type of documentation you want from the 7 More Information secti...

Страница 23: ...ber die daf r zust ndigen und von der Regierung oder rtlichen Beh rden dazu bestimmten Sammelstellen zu entsorgen Ordnungsgem es Entsorgen und Recyceln tr gt dazu bei potentielle negative Folgen f r U...

Страница 24: ...s Ja izme ana atkritumos un p rstr de tiek veikta pareizi tad mazin s iesp jamais kait jums dabai un cilv ku vesel bai S k kas zi as par novecoju a apr kojuma izme anu atkritumos j s varat sa emt viet...

Страница 25: ...zwr ci si do lokalnych w adz s u b oczyszczania miasta lub sklepu w kt rym produkt zosta nabyty Portugu s Portuguese Informa o ambiental para clientes da Uni o Europeia A Directiva Europeia 2002 96 CE...

Страница 26: ...lisesta kotitalousj tteest Sinun vastuullasi on h vitt t m elektroniikkatuote ja muut vastaavat elektroniikkatuotteet viem ll tuote tai tuotteet viranomaisten m r m n ker yspisteeseen Laitteiston oike...

Страница 27: ...S LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE C...

Страница 28: ...d Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE...

Страница 29: ...clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING...

Страница 30: ...Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is al...

Страница 31: ...om time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If...

Страница 32: ...ES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR AN...

Страница 33: ...CULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREME...

Отзывы: