Page 76 / 86 Scroll up to view Page 71 - 75
Troubleshooting
Cisco WAP2000 Wireless-G Access Point with Power Over Ethernet Administration Guide
71
A
What is a MAC Address?
The Media Access Control (MAC) address is a unique number assigned by the
manufacturer to any Ethernet networking device, such as a network adapter, that
allows the network to identify it at the hardware level. For all practical purposes,
this number is usually permanent. Unlike IP addresses, which can change every
time a computer logs on to the network, the MAC address of a device stays the
same, making it a valuable identifier for the network.
How do I avoid interference?
Using multiple access points on the same channel and in close proximity to one
another will generate interference. When employing multiple access points, make
sure to operate each one on a different channel (frequency).
How do I reset the access point?
Press the Reset button on the back of the access point for about ten seconds. This
will reset the unit to its default settings.
How do I resolve issues with signal loss?
There is no way to know the exact range of your wireless network without testing.
Every obstacle placed between an access point and wireless computer will
create signal loss. Leaded glass, metal, concrete floors, water, and walls will inhibit
the signal and reduce range. Start with your access point and your wireless
computer in the same room and move it away in small increments to determine the
maximum range in your environment.
You may also try using different channels, as this may eliminate interference
affecting only one channel. Also, open the access point’s web-based utility, click
Wireless > Advanced
, and make sure the output power is set to 100%.
Does the access point function as a firewall?
No. The access point is only a bridge from wired Ethernet to wireless clients.
I have excellent signal strength, but cannot see my network.
Wireless security, such as WEP or WPA, is probably enabled on the access point,
but not on your wireless adapter (or vice versa). Verify that the same wireless
security settings are being used on all devices in your wireless network.
What is the maximum number of users the access point can handle?
No more than 45, but this depends on the volume of data and may be fewer if
many users create a large amount of network traffic.
Page 77 / 86
B
Cisco WAP2000 Wireless-G Access Point with Power Over Ethernet Administration Guide
72
Wireless Security Checklist
Wireless networks are convenient and easy to install, so homes with high-speed
Internet access are adopting them at a rapid pace.
Wireless networking operates by sending information over radio waves. As a
result, it can be more vulnerable to intruders than a traditional wired network. Like
signals from your cellular or cordless phones, signals from your wireless network
can also be intercepted.
Because you cannot physically prevent someone from connecting to your
wireless network, you need to take some additional steps to keep your network
secure.
Security Checklist
The following is a complete list of security precautions to take (you should follow
at least steps 1 through 6):
1.
Change the default SSID. (See
Change the Default Wireless Network Name
or SSID, page 73
.)
2.
Disable SSID Broadcast. (See
Disable SSID Broadcast, page 73
.)
3.
Change the default password for the Administrator account. (See
Change the
Default Password, page 73
.)
4.
Change the password for the Administrator account regularly. (See
Change the
Administrator’s Password Regularly, page 73
.)
5.
Enable MAC Address Filtering. (See
Enable MAC Address Filtering, page 74
.)
6.
Change the SSID periodically. (See
Change the SSID Periodically, page 74
.)
7.
Use the highest encryption algorithm possible. (See
Enable Encryption,
page 74
.)
Page 78 / 86
Wireless Security Checklist
Security Checklist
Cisco WAP2000 Wireless-G Access Point with Power Over Ethernet Administration Guide
73
B
Change the Default Wireless Network Name or SSID
Wireless devices have a default wireless network name or Service Set Identifier
(SSID) set by the factory. This is the name of your wireless network and can be up
to 32 characters in length. Cisco wireless products use “ciscosb” as the default
wireless network name. You should change the wireless network name to
something unique to distinguish your wireless network from other wireless
networks that may exist around you, but do not use personal information (such as
your Social Security number) because this information may be available for
anyone to see when browsing for wireless networks.
Disable SSID Broadcast
Most wireless networking devices give you the option of broadcasting the SSID.
While this option may be more convenient, it allows anyone to log into your
wireless network. This includes hackers. So, don’t broadcast the SSID.
Change the Default Password
For wireless products such as access points and routers, you will be asked for a
password when you want to change their settings. These devices have a default
password set by the factory. The Cisco default password is admin. Hackers know
these defaults and may try to use them to access your wireless device and
change your network settings. To thwart any unauthorized changes, customize the
device’s password so it will be hard to guess.
Change the Administrator’s Password Regularly
With every wireless networking device you use, keep in mind that network
settings (SSID, WEP keys, etc.) are stored in its firmware. Your network
administrator is the only person who can change network settings.
If a hacker gets a hold of the administrator’s password, he, too, can change those
settings. So, make it harder for a hacker to get that information. Change the
administrator’s password regularly.
Page 79 / 86
Wireless Security Checklist
Security Checklist
Cisco WAP2000 Wireless-G Access Point with Power Over Ethernet Administration Guide
74
B
Enable MAC Address Filtering
Cisco routers give you the ability to enable Media Access Control (MAC) address
filtering. The MAC address is a unique series of numbers and letters assigned to
every networking device. With MAC address filtering enabled, wireless network
access is provided solely for wireless devices with specific MAC addresses. For
example, you can specify the MAC address of each computer in your home so that
only those computers can access your wireless network.
Change the SSID Periodically
Change your SSID regularly so that any hackers who have gained access to your
wireless network will have to start from the beginning in trying to break in.
Enable Encryption
Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless
security concerns. This is overstating WEP’s ability. Again, this can only provide
enough security to make a hacker’s job more difficult.
!
CAUTION
Always remember that each device in your wireless network
must
use the same
encryption method and encryption key or your wireless network will not function
properly.
There are several ways that WEP can be maximized:
Use the highest level of encryption possible.
Change your WEP key regularly.
The WAP2000 access point supports the following encryption algorithms.
WPA—Wi-Fi Protected Access (WPA) is the replacement standard for WEP
in Wi-Fi security. Two modes are available: Personal, and Enterprise. Both
give you a choice of two encryption methods: TKIP (Temporal Key Integrity
Protocol), which utilizes a stronger encryption method and incorporates
Message Integrity Code (MIC) to provide protection against hackers, and
AES (Advanced Encryption System), which utilizes a symmetric 128-Bit
block data encryption. Enterprise utilizes a RADIUS server for
authentication and the use of dynamic TKIP, AES, or WEP.
Page 80 / 86
Wireless Security Checklist
Security Checklist
Cisco WAP2000 Wireless-G Access Point with Power Over Ethernet Administration Guide
75
B
-
WPA Personal—If you do not have a RADIUS server, select the type of
algorithm, TKIP or AES, enter a password in the Pre-Shared key field of
8-63 characters, and enter a Group Key Renewal period time between 0
and 99,999 seconds, which instructs the AP or other device how often it
should change the encryption keys.
-
WPA Enterprise—WPA used in coordination with a RADIUS server. (This
should only be used when a RADIUS server is connected to the AP or
other device.) First, select the type of WPA algorithm, TKIP or AES. Enter
the RADIUS server’s IP Address and port number, along with a key
shared between the device and the server.
WPA2—Wi-Fi Protected Access 2 (WPA2) is the latest security standard in
Wi-Fi security. Two modes are available: Personal and Enterprise. WPA2
always uses AES (Advanced Encryption System) for stronger data
encryption.
-
WPA2 Personal—If you do not have a RADIUS server, enter a password
in the Pre-Shared key field of 8-63 characters, and enter a Group Key
Renewal period time between 0 and 99,999 seconds, which instructs
the AP or other device how often it should change the encryption keys.
-
WPA2 Enterprise—WPA2 used in coordination with a RADIUS server.
(This should only be used when a RADIUS server is connected to the AP
or other device.) First, enter the RADIUS server’s IP Address and port
number, along with a key shared between the device and the server.
Then, enter a Group Key Renewal period, which instructs the device
how often it should change the encryption keys.
WPA2 Mixed—WPA2 Mixed modes provide users an upgrade path from
WPA to WPA2. You can have client devices running both WPA and WPA2
and the access point will automatically select the security method used by
the client.
Implementing encryption may have a negative impact on your network’s
performance, but if you are transmitting sensitive data over your network, you
should enable encryption to protect your data.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top