User manual LINKSYS WMCE54AG
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual LINKSYS WMCE54AG. We hope that this LINKSYS WMCE54AG user guide will be useful to you.
Lastmanuals help download the user guide LINKSYS WMCE54AG.
You may also download the following manuals related to this product:
LINKSYS WMCE54AG INSTALL GUIDE (324 ko)
LINKSYS WMCE54AG PRODUCT BROCHURE (77 ko)
Manual abstract: user guide LINKSYS WMCE54AG
Detailed instructions for use are in the User's Guide.
[. . . ] ®
A Division of Cisco Systems, Inc.
Dual-Band
Dual-Band
Media Center Extender
5 GHz 2. 4 GHz
802. 11a
802. 11g
Wireless A/G
User Guide
WIRELESS
Model No.
WMCE54AG
Dual-Band Wireless A/G Media Center Extender
Copyrights and Trademarks
Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. Copyright © 2004 Cisco Systems, Inc. Other brands and product names are trademarks or registered trademarks of their respective holders. [. . . ] Use the highest encryption algorithm possible. Please note that this may reduce your network performance. Change the WEP encryption keys periodically. To ensure network security, steps one through five should be followed, at least. NOTE: Some of these security features are available only through the network router or access point. Refer to the router or access point's documentation for more information.
Appendix B: Wireless Security Security Precautions
25
Dual-Band Wireless A/G Media Center Extender
Security Threats Facing Wireless Networks
Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking products first listen for "beacon messages". These messages can be easily decrypted and contain much of the network's information, such as the network's SSID (Service Set Identifier). Here are the steps you can take: Change the administrator's password regularly. With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc. ) are stored in its firmware. Your network administrator is the only person who can change network settings. If a hacker gets a hold of the administrator's password, he, too, can change those settings. So, make it harder for a hacker to get that information. Change the administrator's password regularly. There are several things to keep in mind about the SSID: 1. Change it often Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is "linksys". ) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.
26
Appendix B: Wireless Security Security Threats Facing Wireless Networks
Dual-Band Wireless A/G Media Center Extender Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address. [. . . ] Some jurisdictions do not allow limitations on how long an implied warranty lasts, so the above limitation may not apply to You. This warranty gives You specific legal rights, and You may also have other rights which vary by jurisdiction. This warranty does not apply if the Product (a) has been altered, except by Linksys, (b) has not been installed, operated, repaired, or maintained in accordance with instructions supplied by Linksys, or (c) has been subjected to abnormal physical or electrical stress, misuse, negligence, or accident. In addition, due to the continual development of new techniques for intruding upon and attacking networks, Linksys does not warrant that the Product will be free of vulnerability to intrusion or attack. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE LINKSYS WMCE54AG Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service. Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual LINKSYS WMCE54AG will begin.