Linksys WRTP54G User Manual

Page of 114
Wireless-G Broadband Router with 2 Phone Ports
80
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
Security Threats Facing Wireless Networks 
Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking 
products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the 
network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:
Change the administrator’s password regularly. With every wireless networking device you use, keep in 
mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the 
only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too, 
can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s 
password regularly.
SSID. There are several things to keep in mind about the SSID: 
1. Disable Broadcast 
2. Make it unique 
3. Change it often 
Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be 
more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast 
the SSID.
Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is 
“linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to 
something unique and not something related to your company or the networking products you use.