Linksys WPC300N Инструкция по эксплуатации онлайн [42/65] 46315
![Linksys WPC300N Инструкция по эксплуатации онлайн [42/65] 46315](/views2/1050063/page42/bg2a.png)
36
Appendix C: Wireless Security
Security Threats Facing Wireless Networks
Wireless-N Notebook Adapter
1. Disable Broadcast
2. Make it unique
3. Change it often
Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be
more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast
the SSID.
Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.)
Hackers know these defaults and can check these against your network. Change your SSID to something unique
and not something related to your company or the networking products you use.
Change your SSID regularly so that any hackers who have gained access to your wireless network will have to
start from the beginning in trying to break in.
MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only
those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with
a random MAC Address.
WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns.
This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job more
difficult.
There are several ways that WEP can be maximized:
1. Use the highest level of encryption possible
2. Use “Shared Key” authentication
3. Change your WEP key regularly
WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are
available: WPA Personal and Radius. WPA Personal gives you a choice of two encryption methods: TKIP (Temporal
Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code
(MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric
128-Bit block data encryption. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for
authentication.
Important: Always remember that each
device in your wireless network MUST use
the same encryption method and encryption
key or your wireless network will not function
properly.
Содержание
- Copyright and trademarks 2
- How to use this user guide 2
- Appendix a troubleshooting 28 3
- Appendix b windows xp wireless zero configuration 32 3
- Appendix c wireless security 35 3
- Appendix d windows help 38 appendix e glossary 39 appendix f specifications 44 3
- Chapter 1 introduction 1 3
- Chapter 2 planning your wireless network 3 3
- Chapter 3 getting to know the wireless n notebook adapter 5 3
- Chapter 4 setting up and connecting the wireless n notebook adapter 6 3
- Chapter 5 using the wireless network monitor 15 3
- Table of contents 3
- List of figures 5
- Chapter 1 introduction 7
- Welcome 7
- What s in this user guide 7
- Chapter 2 planning your wireless network 9
- Network topology 9
- Roaming 9
- Network layout 10
- Chapter 3 getting to know the wireless n notebook adapter 11
- Link act 11
- The led indicators 11
- Chapter 4 setting up and connecting the wireless n notebook adapter 12
- Starting the setup 12
- Available wireless networks 13
- Connecting the adapter 13
- Setting up the adapter 13
- Advanced setup 16
- Wpa personal 18
- Wpa2 personal 18
- Eap tls 19
- Radius 19
- Accessing the wireless network monitor 21
- Chapter 5 using the wireless network monitor 21
- Link information 21
- Using the wireless network monitor 21
- Wireless network status 22
- Wireless network statistics 23
- Connect 24
- Site information 24
- Profile information 25
- Profiles 25
- Available wireless networks 26
- Create a new profile 26
- Advanced setup 28
- Wpa personal 31
- Wpa2 personal 31
- Eap tls 32
- Radius 32
- Appendix a troubleshooting 34
- Common problems and solutions 34
- Frequently asked questions 34
- Appendix b windows xp wireless zero configuration 38
- Windows xp wireless zero configuration 38
- Appendix c wireless security 41
- Security precautions 41
- Security threats facing wireless networks 41
- Appendix d windows help 44
- Network neighborhood my network places 44
- Shared resources 44
- Tcp ip 44
- Appendix e glossary 45
- Appendix f specifications 50
- Appendix g warranty information 52
- Appendix h regulatory information 53
- Radio en 300 328 emc en 301 489 1 en 301 489 17 safety en 60950 and either en 50385 or en 50371 55
- Table 1 applicable power levels in france 56
- Technical documents on www linksys com international 58
- Appendix i contact information 64
- If you experience problems with any linksys product you can e mail us at 64
- In europe e mail address 64
- Need to contact linksys visit us online for information on the latest products and updates to your existing products at http www linksys com international 64
- Wireless n notebook adapter 64
- Outside of europe e mail address 65
- Support may be only available for your country in english 65
- Wireless n notebook adapter 65
Похожие устройства
- Denon DVD-1920 Инструкция по эксплуатации
- Vitek VT-1979 White Инструкция по эксплуатации
- Haier AB12CS1ERA+1U12BS2ERA Инструкция по эксплуатации
- Linksys WPC54GX Инструкция по эксплуатации
- Iriver T50 Инструкция по эксплуатации
- Haier AB18CS1ERA+1U18FS2ERA Инструкция по эксплуатации
- Vitek VT-1979 Black Инструкция по эксплуатации
- Linksys E2000 Инструкция по эксплуатации
- Haier AB24ES1ERA+1U24GS1ERA Инструкция по эксплуатации
- Vitek VT-1701 White Инструкция по эксплуатации
- Linksys WPC54GS Инструкция по эксплуатации
- Vitek VT-1763 Инструкция по эксплуатации
- Haier AB28ES1ERA+1U28HS1ERA Инструкция по эксплуатации
- Linksys E1500 Инструкция по эксплуатации
- Haier AB36ES1ERA+1U36HS1ERA Инструкция по эксплуатации
- BBK LD1506SI Инструкция по эксплуатации
- Vitek VT-1764 Инструкция по эксплуатации
- Linksys E3000 Инструкция по эксплуатации
- Creative WP-350 Инструкция по эксплуатации
- Haier AB48ES1ERA+1U48LS1ERA Инструкция по эксплуатации