Page 51 / 69 Scroll up to view Page 46 - 50
45
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
Wireless-N Access Point with Power Over Ethernet
SSID.
There are several things to keep in mind about the SSID:
1.
Disable Broadcast
2.
Make it unique
3.
Change it often
Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be
more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast
the SSID.
Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.)
Hackers know these defaults and can check these against your network. Change your SSID to something unique
and not something related to your company or the networking products you use.
Change your SSID regularly so that any hackers who have gained access to your wireless network will have to
start from the beginning in trying to break in.
MAC Addresses.
Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only
those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with
a random MAC Address.
WEP Encryption.
Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security
concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job
more difficult.
There are several ways that WEP can be maximized:
1.
Use the highest level of encryption possible
2.
Change your WEP key regularly
WPA.
Wi-Fi Protected Access (WPA) is the replacement standard for WEP in Wi-Fi security. Two modes are
available: Personal, and Enterprise. Both give you a choice of two encryption methods: TKIP (Temporal Key
Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to
provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit
block data encryption. Enterprise utilizes a RADIUS server for authentication and the use of dynamic TKIP, AES, or
WEP.
Important:
Always remember that each
device in your wireless network MUST use
the same encryption method and encryption
key or your wireless network will not function
properly.
Page 52 / 69
46
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
Wireless-N Access Point with Power Over Ethernet
WPA Personal
. If you do not have a RADIUS server, select the type of algorithm, TKIP or AES, enter a
password in the Pre-Shared key field of 8-63 characters, and enter a Group Key Renewal period time between
0 and 99,999 seconds, which instructs the AP or other device how often it should change the encryption keys.
WPA Enterprise
. WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS
server is connected to the AP or other device.) First, select the type of WPA algorithm,
TKIP
or
AES
. Enter the
RADIUS server’s IP Address and port number, along with a key shared between the device and the server.
Last, enter a Group Key Renewal period, which instructs the device how often it should change the encryption
keys.
WPA2.
Wi-Fi Protected Access 2 (WPA2) is the latest security standard in Wi-Fi security. Two modes are available:
Personal and Enterprise. WPA2 always uses AES (Advanced Encryption System) for stronger data encryption.
WPA2 Personal
. If you do not have a RADIUS server, enter a password in the Pre-Shared key field of 8-63
characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the
AP or other device how often it should change the encryption keys.
WPA2 Enterprise
. WPA2 used in coordination with a RADIUS server. (This should only be used when a
RADIUS server is connected to the AP or other device.) First, enter the RADIUS server’s IP Address and port
number, along with a key shared between the device and the server. Then, enter a Group Key Renewal period,
which instructs the device how often it should change the encryption keys.
WPA2 Mixed.
WPA2 Mixed modes provide users an upgrade path from WPA to WPA2. You can have client devices
running both WPA and WPA2 and the Access Point will automatically select the security method used by the
client.
Implementing encryption may have a negative impact on your network’s performance, but if you are transmitting
sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying the most flexible
and convenient technology Linksys has to offer.
Page 53 / 69
47
Appendix C: Upgrading Firmware
Wireless-N Access Point with Power Over Ethernet
Appendix C: Upgrading Firmware
The Access Point's firmware is upgraded through the Web-based Utility’s Administration - Firmware Upgrade tab.
Follow these instructions:
1.
Download the firmware upgrade file from the Linksys website,
www.linksys.com
.
2.
Extract the firmware upgrade file on your computer.
3.
Open the Access Point’s Web-based Utility.
4.
Click the
Administration
tab.
5.
Click the
Upgrade Firmware
tab.
6.
On the
Firmware Upgrade
screen, enter the location of the firmware upgrade file in the field provided, or click
the
Browse
button to find the file.
7.
Click the
Upgrade
button, and follow the on-screen instructions.
Figure C-1: Firmware Upgrade
Page 54 / 69
48
Appendix D: Windows Help
Wireless-N Access Point with Power Over Ethernet
Appendix D: Windows Help
Almost all wireless products require Microsoft Windows. Windows is the most used operating system in the world
and comes with many features that help make networking easier. These features can be accessed through
Windows Help and are described in this appendix.
TCP/IP
Before a computer can communicate with the Access Point, TCP/IP must be enabled. TCP/IP is a set of
instructions, or protocol, all PCs follow to communicate over a network. This is true for wireless networks as well.
Your PCs will not be able to utilize wireless networking without having TCP/IP enabled. Windows Help provides
complete instructions on enabling TCP/IP.
Shared Resources
If you wish to share printers, folder, or files over your network, Windows Help provides complete instructions on
utilizing shared resources.
Network Neighborhood/My Network Places
Other PCs on your network will appear under Network Neighborhood or My Network Places (depending upon the
version of Windows you're running). Windows Help provides complete instructions on adding PCs to your
network.
Page 55 / 69
49
Appendix E: Glossary
Wireless-N Access Point with Power Over Ethernet
Appendix E: Glossary
This glossary contains some basic networking terms you may come across when using this product. For more
advanced terms, see the complete Linksys glossary at http://www.linksys.com/glossary.
Access Point
- A device that allows wireless-equipped computers and other devices to communicate with a
wired network. Also used to expand the range of a wireless network.
Ad-hoc
- A group of wireless devices communicating directly with each other (peer-to-peer) without the use of
an access point.
AES
(
A
dvanced
E
ncryption
S
tandard) - A security method that uses symmetric 128-bit block data encryption.
Bandwidth
- The transmission capacity of a given device or network.
Bit
- A binary digit.
Boot
- To start a device and cause it to start executing instructions.
Broadband
- An always-on, fast Internet connection.
Browser
- An application program that provides a way to look at and interact with all the information on the
World Wide Web.
Byte
- A unit of data that is usually eight bits long
Cable Modem
- A device that connects a computer to the cable television network, which in turn connects to the
Internet.
Daisy Chain
- A method used to connect devices in a series, one after the other.
DDNS
(
D
ynamic
D
omain
N
ame
S
ystem) - Allows the hosting of a website, FTP server, or e-mail server with a
fixed domain name (e.g., www.xyz.com) and a dynamic IP address.
Default Gateway
- A device that forwards Internet traffic from your local area network.
DHCP
(
D
ynamic
H
ost
C
onfiguration
P
rotocol) - A networking protocol that allows administrators to assign
temporary IP addresses to network computers by "leasing" an IP address to a user for a limited amount of time,
instead of assigning permanent IP addresses.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top