Cisco Small Business RV 120W Wireless-N VPN Firewall ...
Cisco Small Business RV 120W Wireless-N VPN Firewall ... Cisco Small Business RV 120W Wireless-N VPN Firewall ...
3Configuring the Wireless NetworkThis chapter describes how to configure your wireless network and includes thefollowing sections:• A Note About Wireless Security, page 51• Understanding the Cisco RV120W’s Wireless Networks, page 54• Configuring Basic Wireless Settings, page 54• Configuring Advanced Wireless Settings, page 61• Configuring Wi-Fi Protected Setup, page 62• Configuring a Wireless Distribution System (WDS), page 63A Note About Wireless SecurityWireless networks are convenient and easy to install, so small businesses withhigh-speed Internet access are adopting them at a rapid pace. Because wirelessnetworking operates by sending information over radio waves, it can be morevulnerable to intruders than a traditional wired network. Like signals from yourcellular or cordless phones, signals from your wireless network can also beintercepted. The following information will help you to improve your security:• Wireless Security Tips, page 52• General Network Security Guidelines, page 53Cisco RV120W Administration Guide 51
Configuring the Wireless NetworkA Note About Wireless Security3Wireless Security TipsSince you cannot physically prevent someone from connecting to your wirelessnetwork, you need to take some additional steps to keep your network secure:• Change the default wireless network name or SSIDWireless devices have a default wireless network name or Service SetIdentifier (SSID) set by the factory. This is the name of your wirelessnetwork, and can be up to 32 characters in length.You should change the wireless network name to something unique todistinguish your wireless network from other wireless networks that mayexist around you, but do not use personal information (such as your SocialSecurity number) because this information may be available for anyone tosee when browsing for wireless networks.• Change the default passwordFor wireless products such as access points, routers, and gateways, youwill be asked for a password when you want to change their settings. Thesedevices have a default password set by the factory. The default passwordis often admin. Hackers know these defaults and may try to use them toaccess your wireless device and change your network settings. To thwartany unauthorized changes, customize the device’s password so it will behard to guess.• Enable MAC address filteringCisco routers and gateways give you the ability to enable Media AccessControl (MAC) address filtering. The MAC address is a unique series ofnumbers and letters assigned to every networking device. With MACaddress filtering enabled, wireless network access is provided solely forwireless devices with specific MAC addresses. For example, you canspecify the MAC address of each computer in your network so that onlythose computers can access your wireless network.Cisco RV120W Administration Guide 52
- Page 10 and 11: 1IntroductionThis chapter describes
- Page 12 and 13: IntroductionProduct Overview1Securi
- Page 14 and 15: IntroductionGetting to Know the Cis
- Page 16 and 17: IntroductionMounting the Cisco RV12
- Page 18 and 19: IntroductionConnecting the Equipmen
- Page 20 and 21: IntroductionConnecting the Equipmen
- Page 22 and 23: IntroductionUsing the Getting Start
- Page 24 and 25: IntroductionNavigating through the
- Page 26 and 27: IntroductionSaving Your Changes1Sav
- Page 28 and 29: 2Configuring NetworkingThe networki
- Page 30 and 31: Configuring NetworkingConfiguring t
- Page 32 and 33: Configuring NetworkingConfiguring t
- Page 34 and 35: Configuring NetworkingConfiguring t
- Page 36 and 37: Configuring NetworkingConfiguring t
- Page 38 and 39: Configuring NetworkingConfiguring t
- Page 40 and 41: Configuring NetworkingConfiguring t
- Page 42 and 43: Configuring NetworkingConfiguring t
- Page 44 and 45: Configuring NetworkingConfiguring R
- Page 47 and 48: Configuring NetworkingConfiguring R
- Page 49 and 50: Configuring NetworkingConfiguring P
- Page 51 and 52: Configuring NetworkingConfiguring I
- Page 55 and 56: Configuring NetworkingConfiguring I
- Page 57 and 58: Configuring NetworkingConfiguring I
- Page 59: Configuring NetworkingConfiguring I
- Page 63 and 64: Configuring the Wireless NetworkUnd
- Page 65 and 66: Configuring the Wireless NetworkCon
- Page 67 and 68: Configuring the Wireless NetworkCon
- Page 69 and 70: Configuring the Wireless NetworkCon
- Page 71 and 72: Configuring the Wireless NetworkCon
- Page 73 and 74: Configuring the Wireless NetworkCon
- Page 75 and 76: Configuring the FirewallCisco RV120
- Page 77 and 78: Configuring the FirewallConfiguring
- Page 79 and 80: Configuring the FirewallConfiguring
- Page 81 and 82: Configuring the FirewallConfiguring
- Page 83 and 84: Configuring the FirewallConfiguring
- Page 85 and 86: Configuring the FirewallConfiguring
- Page 87 and 88: Configuring the FirewallConfiguring
- Page 89 and 90: Configuring the FirewallConfiguring
- Page 91 and 92: Configuring the FirewallConfiguring
- Page 93 and 94: Configuring the FirewallConfiguring
- Page 95 and 96: Configuring the FirewallConfiguring
- Page 97 and 98: Configuring the FirewallFirewall Co
- Page 99 and 100: Configuring the FirewallFirewall Co
- Page 101 and 102: 5Configuring Virtual Private Networ
- Page 103 and 104: Configuring Virtual Private Network
- Page 105 and 106: Configuring Virtual Private Network
- Page 107 and 108: Configuring Virtual Private Network
- Page 109 and 110: Configuring Virtual Private Network
3Configuring the <strong>Wireless</strong> NetworkThis chapter describes how to configure your wireless network and includes thefollowing sections:• A Note About <strong>Wireless</strong> Security, page 51• Understanding the <strong>Cisco</strong> <strong>RV</strong><strong>120W</strong>’s <strong>Wireless</strong> Networks, page 54• Configuring Basic <strong>Wireless</strong> Settings, page 54• Configuring Advanced <strong>Wireless</strong> Settings, page 61• Configuring Wi-Fi Protected Setup, page 62• Configuring a <strong>Wireless</strong> Distribution System (WDS), page 63A Note About <strong>Wireless</strong> Security<strong>Wireless</strong> networks are convenient and easy to install, so small businesses withhigh-speed Internet access are adopting them at a rapid pace. Because wirelessnetworking operates by sending information over radio waves, it can be morevulnerable to intruders than a traditional wired network. Like signals from yourcellular or cordless phones, signals from your wireless network can also beintercepted. The following information will help you to improve your security:• <strong>Wireless</strong> Security Tips, page 52• General Network Security Guidelines, page 53<strong>Cisco</strong> <strong>RV</strong><strong>120W</strong> Administration Guide 51