User Manual
Table Of Contents
- Chapter 1: Planning Your Network
- Chapter 2: Getting to Know the Wireless-G ADSL Gateway with 2 Phone Ports
- Chapter 3: Connecting the Wireless-G ADSL Gateway
- Chapter 4: Configuring the Gateway
- Chapter 5: Using the Linksys Parental Control Service
- Appendix A: Troubleshooting
- Appendix B: Wireless Security
- Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway
- Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter
- Appendix E: Upgrading Firmware
- Appendix F: Windows Help
- Appendix G: Glossary
- Appendix H: Specifications
- Appendix I: Warranty Information
- Appendix J: Regulatory Information
- Appendix K: Contact Information
92
Appendix B:
Important Information for Wireless Products
Wireless-G ADSL Gateway with 2 Phone Ports
MAC Addresses. Enable MAC Address filtering. MAC Address filtering w ill allow you to provide access to only
those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network w ith
a random MAC Address.
WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security
concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job
more difficult.
There are several ways that WEP can be maximized:
A. Use the highest level of encryption possible
B. Use a “ Shared” Key
C. Use multiple WEP keys
D. Change your WEP key regularly
Implementing encryption will have a negative impact on your network’s performance. If you are transmitting
sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying the most flexible
and convenient technology Linksys has to offer.