Manual
Table Of Contents
- User Guide
- Table of Contents
- List of Figures
- Chapter 1: Introduction
- Chapter 2: Planning your Network
- Chapter 3: Getting to Know the Wireless-G ADSL Gateway
- Chapter 4: Connecting the Wireless-G Broadband Gateway
- Chapter 5: Configuring the Gateway
- Appendix A: Troubleshooting
- Appendix B: Wireless Security
- Appendix C: Configuring IPSec between a Windows 2000 or XP Computer and the Gateway
- Appendix D: Finding the MAC Address and IP Address for Your Ethernet Adapter
- Appendix E: Upgrading Firmware
- Appendix F: Glossary
- Appendix G: Specifications
- Appendix H: Regulatory Information
- Appendix I: Warranty Information
- Appendix J: Contact Information

61
Appendix B:
Important Information for Wireless Products
Wireless-G ADSL Gateway
MAC Addresses. Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only
those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with
a random MAC Address.
WEP Encryption. Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security
concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job
more difficult.
There are several ways that WEP can be maximized:
A. Use the highest level of encryption possible
B. Use a “Shared” Key
C. Use multiple WEP keys
D. Change your WEP key regularly
Implementing encryption will have a negative impact on your network’s performance. If you are transmitting
sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying the most flexible
and convenient technology Linksys has to offer.










