Cyber Security Expo
 
Securing your Linksys WRT54G by Rick Wanner on 05/10/07

Wireless networks are becoming increasingly common due to the ease and cost of deployment of the LAN using wireless technologies. Wireless networks provide different challenges than wired networks, especially in securing data in transit between the client and the wireless access point. The common wireless standards, provide mechanisms for securing wireless data, and despite the limitations of the wireless, when the provided mechanisms are deployed and maintained in a systematic manner data can be secured against all but the most determined and patient attacker.

This paper describes security strategies for the Linksys Wireless Router, model WRT54G, Version 2. Specifically the WRT54G running firmware version 4.21.1. Other firmware versions and Linksys wireless products may have slight variances in functionality, but the general principles should apply.

This paper assumes the user is familiar with the Linksys web-based management interface, and how to use a web browser as well as basic wireless principles.

This document is in PDF format. To view it click here.

Rate this article

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.