Linksys WPC54GS Инструкция по эксплуатации онлайн [40/54] 46330
![Linksys WPC54GS Инструкция по эксплуатации онлайн [40/54] 46330](/views2/1050078/page40/bg28.png)
35
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
Wireless-G Notebook Adapter with SpeedBooster
1. Disable Broadcast
2. Make it unique
3. Change it often
Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be
more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast
the SSID.
Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.)
Hackers know these defaults and can check these against your network. Change your SSID to something unique
and not something related to your company or the networking products you use.
Change your SSID regularly so that any hackers who have gained access to your wireless network will have to
start from the beginning in trying to break in.
MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only
those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with
a random MAC Address.
WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security
concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job
more difficult.
There are several ways that WEP can be maximized:
1. Use the highest level of encryption possible
2. Use “Shared Key” authentication
3. Change your WEP key regularly
WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Three modes are
available: WPA-PSK, WPA Radius, and Radius. WPA-PSK gives you a choice of two encryption methods: TKIP
(Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message
Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes
a symmetric 128-Bit block data encryption. WPA RADIUS offers two encryption methods, TKIP and AES, with
dynamic encryption keys. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for
authentication.
Important: Always remember that each
device in your wireless network MUST use
the same encryption method and encryption
key or your wireless network will not function
properly.
Содержание
- Copyright and trademarks 2
- This user guide 2
- Appendix a troubleshooting 30 3
- Appendix b wireless security 34 3
- Appendix c windows help 37 appendix d glossary 38 appendix e specifications 45 appendix f warranty information 46 appendix g regulatory information 47 appendix h contact information 49 3
- Chapter 1 introduction 1 3
- Chapter 2 planning your wireless network 4 3
- Chapter 3 getting to know the wireless g notebook adapter 6 3
- Chapter 4 software installation and configuration 7 3
- Chapter 5 hardware installation 12 3
- Chapter 6 using the wireless network monitor 13 3
- Table of contents 3
- List of figures 4
- Chapter 1 introduction 6
- Welcome 6
- What s in this guide 7
- Chapter 2 planning your wireless network 9
- Network topology 9
- Roaming 9
- Network layout 10
- Chapter 3 getting to know the wireless g notebook adapter 11
- The led indicators 11
- Chapter 4 software installation and configuration 12
- The installation procedure 13
- Chapter 5 hardware installation 17
- Connecting the adapter 17
- Accessing the wlan monitor 18
- Chapter 6 using the wireless network monitor 18
- Link information 18
- Wireless network status 19
- Wireless network statistics 20
- Site information 21
- Site survey 21
- Profile information 22
- Profiles 22
- Creating a new profile 23
- Appendix a troubleshooting 35
- Common problems and solutions 35
- Frequently asked questions 36
- Appendix b wireless security 39
- Security precautions 39
- Security threats facing wireless networks 39
- Appendix c windows help 42
- Network neighborhood my network places 42
- Shared resources 42
- Tcp ip 42
- Appendix d glossary 43
- Appendix e specifications 50
- Appendix f warranty information 51
- Appendix g regulatory information 52
- Appendix h contact information 54
Похожие устройства
- Vitek VT-1763 Инструкция по эксплуатации
- Haier AB28ES1ERA+1U28HS1ERA Инструкция по эксплуатации
- Linksys E1500 Инструкция по эксплуатации
- Haier AB36ES1ERA+1U36HS1ERA Инструкция по эксплуатации
- BBK LD1506SI Инструкция по эксплуатации
- Vitek VT-1764 Инструкция по эксплуатации
- Linksys E3000 Инструкция по эксплуатации
- Creative WP-350 Инструкция по эксплуатации
- Haier AB48ES1ERA+1U48LS1ERA Инструкция по эксплуатации
- Vitek VT-5006 Инструкция по эксплуатации
- Vitek VT-3582 Инструкция по эксплуатации
- Linksys E1000 Инструкция по эксплуатации
- Haier AB48ES1ERA+1U48LS1ERB Инструкция по эксплуатации
- Liebherr Ces..3 Инструкция по эксплуатации
- Vitek VT-3585 Инструкция по эксплуатации
- Linksys WUSB600N Инструкция по эксплуатации
- Haier AB60CS1ERA+1U60IS1ERB Инструкция по эксплуатации
- Denon DVD-1600 Инструкция по эксплуатации
- Vitek VT-6601 Инструкция по эксплуатации
- Linksys WAG354G Инструкция по эксплуатации