Linksys WPC54GX Инструкция по эксплуатации онлайн [36/51] 46320
![Linksys WPC54GX Инструкция по эксплуатации онлайн [36/51] 46320](/views2/1050068/page36/bg24.png)
31
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
Wireless-G Notebook Adapter with SRX
SSID. There are several things to keep in mind about the SSID:
1. Disable Broadcast
2. Make it unique
3. Change it often
Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be
more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast
the SSID.
Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.)
Hackers know these defaults and can check these against your network. Change your SSID to something unique
and not something related to your company or the networking products you use.
Change your SSID regularly so that any hackers who have gained access to your wireless network will have to
start from the beginning in trying to break in.
MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only
those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with
a random MAC Address.
WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security
concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job
more difficult.
There are several ways that WEP can be maximized:
1. Use the highest level of encryption possible
2. Use “Shared Key” authentication
3. Change your WEP key regularly
WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Three modes are
available: WPA-Personal, WPA-Enterprise, and Radius. WPA-Personal gives you a choice of two encryption
methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates
Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System),
which utilizes a symmetric 128-Bit block data encryption. WPA-Enterprise offers two encryption methods, TKIP
and AES, with dynamic encryption keys. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS
server for authentication.
IMPORTANT: Always remember that each
device in your wireless network MUST use
the same encryption method and encryption
key or your wireless network will not function
properly.
Содержание
- Copyright and trademarks 2
- This user guide 2
- Appendix a troubleshooting 26 3
- Appendix b wireless security 30 3
- Appendix c windows help 33 appendix d glossary 34 appendix e specifications 41 appendix f warranty information 42 appendix g regulatory information 43 appendix h contact information 46 3
- Chapter 1 introduction 1 3
- Chapter 2 planning your wireless network 3 3
- Chapter 3 getting to know the wireless g notebook adapter with srx 5 3
- Chapter 4 setting up the wireless g notebook adapter with srx 6 3
- Chapter 5 using the wireless network monitor 11 3
- Table of contents 3
- List of figures 4
- Chapter 1 introduction 6
- Welcome 6
- What s in this guide 6
- Chapter 2 planning your wireless network 8
- Network topology 8
- Roaming 8
- Network layout 9
- Chapter 3 getting to know the wireless g notebook adapter with srx 10
- The led indicators 10
- Chapter 4 setting up the wireless g notebook adapter with srx 11
- Overview 11
- Running the setup wizard 11
- Accessing the wireless network monitor 16
- Chapter 5 using the wireless network monitor 16
- Link information 16
- Wireless network status 17
- Wireless network statistics 18
- Site information 19
- Site survey 19
- Profile information 20
- Profiles 20
- Creating a new profile 21
- Appendix a troubleshooting 31
- Common problems and solutions 31
- Frequently asked questions 31
- Appendix b wireless security 35
- Security precautions 35
- Security threats facing wireless networks 35
- Appendix c windows help 38
- Network neighborhood my network places 38
- Shared resources 38
- Tcp ip 38
- Appendix d glossary 39
- Appendix e specifications 46
- Appendix f warranty information 47
- Appendix g regulatory information 48
- Appendix h contact information 51
Похожие устройства
- Iriver T50 Инструкция по эксплуатации
- Haier AB18CS1ERA+1U18FS2ERA Инструкция по эксплуатации
- Vitek VT-1979 Black Инструкция по эксплуатации
- Linksys E2000 Инструкция по эксплуатации
- Haier AB24ES1ERA+1U24GS1ERA Инструкция по эксплуатации
- Vitek VT-1701 White Инструкция по эксплуатации
- Linksys WPC54GS Инструкция по эксплуатации
- Vitek VT-1763 Инструкция по эксплуатации
- Haier AB28ES1ERA+1U28HS1ERA Инструкция по эксплуатации
- Linksys E1500 Инструкция по эксплуатации
- Haier AB36ES1ERA+1U36HS1ERA Инструкция по эксплуатации
- BBK LD1506SI Инструкция по эксплуатации
- Vitek VT-1764 Инструкция по эксплуатации
- Linksys E3000 Инструкция по эксплуатации
- Creative WP-350 Инструкция по эксплуатации
- Haier AB48ES1ERA+1U48LS1ERA Инструкция по эксплуатации
- Vitek VT-5006 Инструкция по эксплуатации
- Vitek VT-3582 Инструкция по эксплуатации
- Linksys E1000 Инструкция по эксплуатации
- Haier AB48ES1ERA+1U48LS1ERB Инструкция по эксплуатации