Cisco Cisco WAP2000 Wireless-G Access Point - PoE Maintenance Manual
B
Cisco WAP2000 Wireless-G Access Point with Power Over Ethernet Administration Guide
72
Wireless Security Checklist
Wireless networks are convenient and easy to install, so homes with high-speed
Internet access are adopting them at a rapid pace.
Internet access are adopting them at a rapid pace.
Wireless networking operates by sending information over radio waves. As a
result, it can be more vulnerable to intruders than a traditional wired network. Like
signals from your cellular or cordless phones, signals from your wireless network
can also be intercepted.
result, it can be more vulnerable to intruders than a traditional wired network. Like
signals from your cellular or cordless phones, signals from your wireless network
can also be intercepted.
Because you cannot physically prevent someone from connecting to your
wireless network, you need to take some additional steps to keep your network
secure.
wireless network, you need to take some additional steps to keep your network
secure.
Security Checklist
The following is a complete list of security precautions to take (you should follow
at least steps 1 through 6):
at least steps 1 through 6):
2. Disable SSID Broadcast. (See
.)
5. Enable MAC Address Filtering. (See
.)
.)
7. Use the highest encryption algorithm possible. (See