Appendix C: Windows Help; Appendix D: Glossary - Linksys Instant Wireless Series User Manual

Dual-band wireless a+g
Hide thumbs Also See for Instant Wireless Series:
Table of Contents

Advertisement

Change your SSID regularly so that any hackers who have gained access to your wireless
network will have to start from the beginning in trying to break in.
MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide
access to only those wireless nodes with certain MAC Addresses. This makes it harder for a
hacker to access your network with a random MAC Address.
WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless
security concerns. This is overstating WEP's ability. Again, this can only provide enough security
to make a hacker's job
more difficult.
There are several ways that WEP can be maximized:
1. Use the highest level of encryption possible
2. Use "Shared Key" authentication
3. Change your WEP key regularly
WPA. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security.
Two modes are available: WPA-PSK and WPA-RADIUS. WPA-PSK gives you a choice of two
encryption methods: TKIP (Temporal
Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message
Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption
Standard), which utilizes a symmetric 128-Bit block data encryption. WPA-RADIUS offers two
encryption methods, TKIP and AES, with dynamic encryption keys, and it uses a RADIUS
(Remote Authentication Dial-In User Service) server for authentication.
WPA-PSK. If you do not have a RADIUS server, select the type of algorithm you want to use,
TKIP or AES, and enter a password in the Passphrase field of 8-63 characters.
WPA-RADIUS. WPA used in coordination with a RADIUS server. (This should only be used when
a RADIUS server is connected to the Router or other device.) WPA-RADIUS offers two encryption
methods, TKIP and AES, with dynamic encryption keys.
Implementing encryption may have a negative impact on your network's performance, but if you
are transmitting sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying the
most flexible and convenient technology Linksys has to offer.

Appendix C: Windows Help

Most Linksys wireless products require Microsoft Windows. Windows is the most used operating
system in the world and comes with many features that help make networking easier. These
features can be accessed through Windows Help and are described in this appendix.
TCP/IP
Before a computer can communicate with an access point or wireless router, TCP/IP must be
enabled. TCP/IP is a set of instructions, or protocol, all PCs follow to communicate over a network.
This is true for wireless networks as well. Your PCs will not be able to utilize wireless networking
without having TCP/IP enabled. Windows Help provides complete instructions on enabling
TCP/IP.
Shared Resources
If you wish to share printers, folder, or files over your network, Windows Help provides complete
instructions on utilizing shared resources.
Network Neighborhood/My Network Places
Other PCs on your network will appear under Network Neighborhood or My Network Places
(depending upon the version of Windows you're running). Windows Help provides complete
instructions on adding PCs to your network.

Appendix D: Glossary

802.11a - An IEEE wireless networking standard that specifies a maximum data transfer rate of
54Mbps and an operating frequency of 5GHz.
802.11b - An IEEE wireless networking standard that specifies a maximum data transfer rate of

Advertisement

Table of Contents
loading

This manual is also suitable for:

Wmp55ag

Table of Contents