O'Reilly logo

Wireless Security: Know It All by Jon S. Wilson, Chris Lanthem, Frank Thornton, George L Stefanek, Timothy Stapko, James F. Ransome PhD, CISM, CISSP, John Rittinghouse PhD, CISM, Stephen A. Rackley, Chris Hurley, Tony Bradley, Dan Bensky, Praphul Chandra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 20. Implementing Basic Wireless Security

20.1. Introduction

This chapter looks at how to configure the basic security settings on the four most popular access points currently deployed for wireless home use (Linksys WAP11, BEFW11SR, and WRT54G, and the D-Link DI-624). It covers the practical steps for implementing wireless security for home systems.

There are four very simple steps that are sufficient for most home users:

  1. Use a unique Service Set Identifier (SSID).
  2. Disable SSID broadcast.
  3. Enable Wired Equivalent Privacy (WEP) encryption.
  4. Filter access by Media Access Control (MAC) address.

20.2. Enabling Security Features on a Linksys WAP11 802.11 b Access Point

The Linksys Wireless Access Point (WAP) 11 802.11b access point was one ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required