Linksys WRT310N [7/53] Wireless security checklist
![Linksys WRT310N [7/53] Wireless security checklist](/views2/1050144/page7/bg7.png)
Chapter 2
Wireless Security Checklist
6
Wireless-N Gigabit Router
Chapter 2:
Wireless Security Checklist
Wireless networks are convenient and easy to install, so
homes with high-speed Internet access are adopting them
at a rapid pace. Because wireless networking operates by
sending information over radio waves, it can be more
vulnerable to intruders than a traditional wired network.
Like signals from your cellular or cordless phones, signals
from your wireless network can also be intercepted. Since
you cannot physically prevent someone from connecting
to your wireless network, you need to take some additional
steps to keep your network secure.
1. Change the default wireless
network name or SSID
Wireless devices have a default wireless network name
or Service Set Identifier (SSID) set by the factory. This
is the name of your wireless network, and can be up
to 32 characters in length. Linksys wireless products
use linksys as the default wireless network name. You
should change the wireless network name to something
unique to distinguish your wireless network from other
wireless networks that may exist around you, but do not
use personal information (such as your Social Security
number) because this information may be available for
anyone to see when browsing for wireless networks.
2. Change the default password
For wireless products such as access points and routers,
you will be asked for a password when you want to change
their settings. These devices have a default password set
by the factory. The Linksys default password is admin.
Hackers know these defaults and may try to use them
to access your wireless device and change your network
settings. To thwart any unauthorized changes, customize
the device’s password so it will be hard to guess.
3. Enable MAC address filtering
Linksys routers give you the ability to enable Media Access
Control (MAC) address filtering. The MAC address is a
unique series of numbers and letters assigned to every
networking device. With MAC address filtering enabled,
wireless network access is provided solely for wireless
devices with specific MAC addresses. For example, you can
specify the MAC address of each computer in your home
so that only those computers can access your wireless
network.
4. Enable encryption
Encryption protects data transmitted over a wireless
network. Wi-Fi Protected Access (WPA/WPA2) and Wired
Equivalency Privacy (WEP) offer different levels of security
for wireless communication.
A network encrypted with WPA/WPA2 is more secure
than a network encrypted with WEP, because WPA/WPA2
uses dynamic key encryption. To protect the information
as it passes over the airwaves, you should enable the
highest level of encryption supported by your network
equipment.
WEP is an older encryption standard and may be the
only option available on some older devices that do not
support WPA.
General Network Security Guidelines
Wireless network security is useless if the underlying
network is not secure.
• Password protect all computers on the network and
individually password protect sensitive files.
• Change passwords on a regular basis.
• Install anti-virus software and personal firewall
software.
• Disable file sharing (peer-to-peer). Some applications
may open file sharing without your consent and/or
knowledge.
Additional Security Tips
• Keep wireless routers, access points, or gateways away
from exterior walls and windows.
• Turn wireless routers, access points, or gateways
off when they are not being used (at night, during
vacations).
• Use strong passphrases that are at least eight characters
in length. Combine letters and numbers to avoid using
standard words that can be found in the dictionary.
WEB: For more information on wireless security,
visit www.linksysbycisco.com/security
Содержание
- Wireless n gigabit router 1
- About this guide 2
- Copyright and trademarks 2
- Icon descriptions 2
- Online resources 2
- Chapter 1 product overview 4 3
- Chapter 2 wireless security checklist 6 3
- Chapter 3 advanced configuration 7 3
- Table of contents 3
- Table of contents 4
- Back panel 5
- Chapter 1 product overview 5
- Front panel 5
- Horizontal placement 5
- Placement positions 5
- Product overview 5
- Chapter 1 6
- Product overview 6
- Wall mounting placement 6
- Additional security tips 7
- Change the default password 7
- Change the default wireless network name or ssid 7
- Chapter 2 wireless security checklist 7
- Enable encryption 7
- Enable mac address filtering 7
- General network security guidelines 7
- Wireless security checklist 7
- Advanced configuration 8
- Basic setup 8
- Chapter 3 advanced configuration 8
- How to access the web based utility 8
- Internet setup 8
- Setup basic setup 8
- Advanced configuration 9
- Chapter 3 9
- Static ip 9
- Advanced configuration 10
- Chapter 3 10
- Optional settings 10
- Telstra cable 10
- Advanced configuration 11
- Chapter 3 11
- Clients already reserved 11
- Dhcp reservation 11
- Dhcp server setting 11
- Network setup 11
- Router ip 11
- Advanced configuration 12
- Chapter 3 12
- Ddns service 12
- Setup ddns 12
- Time setting 12
- Advanced configuration 13
- Advanced routing 13
- Chapter 3 13
- Dynamic routing rip 13
- Mac address clone 13
- Setup advanced routing 13
- Setup mac address clone 13
- Static routing 13
- Advanced configuration 14
- Basic wireless settings 14
- Chapter 3 14
- Wireless basic wireless settings 14
- Advanced configuration 15
- Chapter 3 15
- Method 1 15
- Method 2 15
- Method 3 15
- Security mode 15
- Wi fi protected setup 15
- Wireless security 15
- Wireless wireless security 15
- Advanced configuration 16
- Chapter 3 16
- Radius 16
- Wpa enterprise 16
- Wpa2 enterprise 16
- Wpa2 personal 16
- Access restriction 17
- Advanced configuration 17
- Chapter 3 17
- Mac address filter list 17
- Wireless mac filter 17
- Wireless wireless mac filter 17
- Advanced configuration 18
- Advanced wireless 18
- Advanced wireless settings 18
- Chapter 3 18
- Wireless advanced wireless settings 18
- Advanced configuration 19
- Chapter 3 19
- Firewall 19
- Internet filter 19
- Security firewall 19
- Security vpn passthrough 19
- Vpn passthrough 19
- Web filter 19
- Access restrictions internet access 20
- Advanced configuration 20
- Chapter 3 20
- Internet access 20
- Internet access policy 20
- Summary 20
- Vpn passthrough 20
- Advanced configuration 21
- Applications and gaming single port forwarding 21
- Chapter 3 21
- Single port forwarding 21
- Advanced configuration 22
- Applications and gaming port range forwarding 22
- Applications gaming port range triggering 22
- Chapter 3 22
- Port range forwarding 22
- Port range triggering 22
- Advanced configuration 23
- Applications and gaming dmz 23
- Applications and gaming qos 23
- Chapter 3 23
- Dhcp client table 23
- Qos quality of service 23
- Wireless 23
- Advanced configuration 24
- Applications 24
- Category 24
- Chapter 3 24
- Ethernet port 24
- Internet access priority 24
- Mac address 24
- Online games 24
- Administration management 25
- Advanced configuration 25
- Chapter 3 25
- Management 25
- Remote access 25
- Router access 25
- Summary 25
- Web access 25
- Administration log 26
- Advanced configuration 26
- Backup and restore 26
- Chapter 3 26
- Administration diagnostics 27
- Administration factory defaults 27
- Advanced configuration 27
- Chapter 3 27
- Diagnostics 27
- Factory defaults 27
- Ping test 27
- Reboot 27
- Traceroute test 27
- Administration firmware upgrade 28
- Advanced configuration 28
- Firmware upgrade 28
- Internet connection 28
- Local network 28
- Router 28
- Router information 28
- Status local network 28
- Status router 28
- Advanced configuration 29
- Chapter 3 29
- Dhcp client table 29
- Dhcp server 29
- Local network 29
- Status wireless network 29
- Wireless network 29
- Appendix a 30
- Appendix a troubleshooting 30
- Troubleshooting 30
- Appendix b 31
- Appendix b specifications 31
- Environmental 31
- Specifications 31
- Appendix c warranty information 32
- Exclusions and limitations 32
- Limited warranty 32
- Obtaining warranty service 32
- Warranty information 32
- Appendix c 33
- Technical support 33
- Warranty information 33
- Appendix d 34
- Appendix d regulatory information 34
- Fcc radiation exposure statement 34
- Fcc statement 34
- Regulatory information 34
- Safety notices 34
- Appendix d 35
- Avis d industrie canada 35
- Avis d industrie canada concernant l exposition aux radiofréquences 35
- Avis de non responsabilité concernant les appareils sans fil 35
- Industry canada radiation exposure statement 35
- Industry canada statement 35
- Regulatory information 35
- Wireless disclaimer 35
- Appendix d 36
- Dansk danish miljøinformation for kunder i eu 36
- Deutsch german umweltinformation für kunden innerhalb der europäischen union 36
- English environmental information for customers in the european union 36
- Regulatory information 36
- This document contains important information for users with regards to the proper disposal and recycling of linksys products consumers are required to comply with this notice for all electronic products bearing the following symbol 36
- User information for consumer products covered by eu directive 2002 96 ec on waste electric and electronic equipment weee 36
- Čeština czech informace o ochraně životního prostředí pro zákazníky v zemích evropské unie 36
- Български bulgarian информация относно опазването на околната среда за потребители в европейския съюз 36
- Appendix d 37
- Eesti estonian keskkonnaalane informatsioon euroopa liidus asuvatele klientidele 37
- Español spanish información medioambiental para clientes de la unión europea 37
- Français french informations environnementales pour les clients de l union européenne 37
- Italiano italian informazioni relative all ambiente per i clienti residenti nell unione europea 37
- Latviešu valoda latvian ekoloģiska informācija klientiem eiropas savienības jurisdikcijā 37
- Regulatory information 37
- Ελληνικά greek στοιχεία περιβαλλοντικής προστασίας για πελάτες εντός της ευρωπαϊκής ένωσης 37
- Appendix d 38
- Lietuvškai lithuanian aplinkosaugos informacija skirta europos sąjungos vartotojams 38
- Magyar hungarian környezetvédelmi információ az európai uniós vásárlók számára 38
- Malti maltese informazzjoni ambjentali għal klijenti fl unjoni ewropea 38
- Nederlands dutch milieu informatie voor klanten in de europese unie 38
- Norsk norwegian miljøinformasjon for kunder i eu 38
- Polski polish informacja dla klientów w unii europejskiej o przepisach dotyczących ochrony środowiska 38
- Regulatory information 38
- Appendix d 39
- Português portuguese informação ambiental para clientes da união europeia 39
- Regulatory information 39
- Română romanian informaţii de mediu pentru clienţii din uniunea europeană 39
- Slovenčina slovak informácie o ochrane životného prostredia pre zákazníkov v európskej únii 39
- Slovenščina slovene okoljske informacije za stranke v evropski uniji 39
- Suomi finnish ympäristöä koskevia tietoja eu alueen asiakkaille 39
- Svenska swedish miljöinformation för kunder i europeiska unionen 39
- Web for additional information please visit www linksysbycisco com 39
- Appendix e software end user license agreement 40
- Cisco products 40
- Schedule 1 cisco software license agreement 40
- Software end user license agreement 40
- Software licenses 40
- Appendix e 41
- Software end user license agreement 41
- Appendix e 42
- Software end user license agreement 42
- Appendix e 43
- Schedule 2 network magic features 43
- Software end user license agreement 43
- Appendix e 44
- Gnu general public license 44
- Preamble 44
- Schedule 3 a 44
- Schedule 3 open source and third party licenses 44
- Software end user license agreement 44
- Terms and conditions for copying distribution and modification 44
- Appendix e 45
- Software end user license agreement 45
- Appendix e 46
- No warranty 46
- Software end user license agreement 46
- Appendix e 47
- End of schedule 3 a 47
- Gnu lesser general public license 47
- Preamble 47
- Schedule 3 b 47
- Software end user license agreement 47
- Appendix e 48
- Software end user license agreement 48
- Appendix e 49
- Software end user license agreement 49
- Appendix e 50
- Software end user license agreement 50
- Appendix e 51
- End of schedule 3 b 51
- Software end user license agreement 51
- Appendix e 52
- Openssl license 52
- Original ssleay license 52
- Schedule 3 c openssl license 52
- Software end user license agreement 52
- Appendix e 53
- End of schedule 3 c 53
- Software end user license agreement 53
Похожие устройства
- Haier 4U30HS1ERA Инструкция по эксплуатации
- Akai ED-81 Инструкция по эксплуатации
- Vitek VT-1544 Инструкция по эксплуатации
- Linksys WRT54G3G Инструкция по эксплуатации
- Haier 5U34HS1ERA Инструкция по эксплуатации
- Akai AWM 800WS Инструкция по эксплуатации
- Vitek VT-6406 Инструкция по эксплуатации
- Linksys SE2500 Инструкция по эксплуатации
- Haier AS07ZS2ERA Инструкция по эксплуатации
- Vitek VT-3456 Silver Инструкция по эксплуатации
- BBK LD1506DK Инструкция по эксплуатации
- Linksys SE1500-EE Инструкция по эксплуатации
- Haier AS09ZS2ERA Инструкция по эксплуатации
- Vitek VT-5004 Инструкция по эксплуатации
- Neff T23S36N0 Инструкция по эксплуатации
- Vitek VT-1846 Инструкция по эксплуатации
- Neff T69S86N0 Инструкция по эксплуатации
- Haier AS12ZS2ERA Инструкция по эксплуатации
- Liebherr Ca..3 Инструкция по эксплуатации
- Vitek VT-1831EcoActive Blue Инструкция по эксплуатации