Inside Out

Print configuration details

The final page of the Set Up A Network wizard offers an opportunity to print configuration details . The document includes the network name (SSID) for your wireless network and the passphrase or security key that you created along with other details, so it's handy to have for future reference.

If you click Close before you print the document, you have another option: open the \Smrtntky\Wsetting .txt file on the UFD. This plain-text document also includes other details of your WLAN configuration.

Many routers that don't support WPS have comparable, proprietary systems—usually provided on a setup CD—for configuring the router's SSID, encryption, and other settings . Check the instructions that came with your router for more information .

INSIDE OUT

Beef up security at the access point

If your data is sensitive and your network is in an apartment building or an office complex where you can reasonably expect other people to wander into range with wireless adapters, you should take extra security precautions in addition to enabling WPA. Consider any or all of the following measures to protect your wireless access point from intruders:

• Change the network name (SSID) of your access point to one that doesn't match the hardware defaults and doesn't give away any information about you or your business.

• Disable remote administration of the access point; if you need to change settings, you can do so directly, using a wired connection.

• If you decide to allow remote administration of the access point, set a strong password

• Upgrade the firmware of your wireless hardware (access point and adapter) to the most recent versions, which might incorporate security fixes .

• Consider using virtual private networks for wireless connections .

On larger networks with one or more domain servers available, you can set up a Remote Authentication Dial-In User Service (RADIUS) server to allow the most secure option of all, 802.1x authentication . In addition, consider enabling Internet Protocol security (IPsec)

Was this article helpful?

0 0
Digital Cancers

Digital Cancers

Get All The Support And Guidance You Need To Be A Success At Protecting Your PC. This Book Is One Of The Most Valuable Resources In The World When It Comes To The Damaging Facts About Computer Viruses.

Get My Free Ebook


Post a comment