Cisco Systems WRTP54G Manuel d'utilisateur Page 89

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 114
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 88
Wireless-G Broadband Router with 2 Phone Ports
81
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
Change your SSID regularly so that any hackers who have gained access to your wireless network will have to
start from the beginning in trying to break in.
MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only
those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with
a random MAC Address.
WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security
concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job
more difficult.
There are several ways that WEP can be maximized:
1. Use the highest level of encryption possible
2. Use “Shared Key” authentication
3. Change your WEP key regularly
WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are
available: Pre-Shared Key and RADIUS. Pre-Shared Key gives you one encryption methods: TKIP (Temporal Key
Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to
provide protection against hackers.
WPA Pre-Shared Key. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, enter a
password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time
between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the
encryption keys.
IMPORTANT: Always
remember that each device in
your wireless network MUST
use the same encryption
method and encryption key or
your wireless network will not
function properly.
Vue de la page 88
1 2 ... 84 85 86 87 88 89 90 91 92 93 94 ... 113 114

Commentaires sur ces manuels

Pas de commentaire

Liberty Furniture Non manuels d'utilisation

La liste de Liberty Furniture Non produits contient 1 manuels d'utilisation pour les modèles 1. Tous les guides d'utilisation en format pdf peuvent être téléchargés ou consultés en ligne.

Cliquez sur un alphabet ci-dessous pour faire défiler la liste complète des modèles commençant par cette lettre

Modèles Type de document
Indoor Furnishings 701
Manuel de l'utilisateur   Liberty Furniture Indoor Furnishings 701 User's Manual, 7 pages