Network Security Best Practices

Size: px
Start display at page:

Download "Network Security Best Practices"

Transcription

1 CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA

2 TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual Devices 4 05 Securing the Wireless Network 4 06 Authentication 6 07 Wireless Security Protocols 6 08 Conclusion 7 09 Informative References 7 CEDIA Education 7 CISCO Certification 7 10 Appendix A: Wireless Standards 7 11 Appendix B: Design and Implentation of a Wireless Solution 8 12 Appendix C: Abbreviations Used in this Document 9

3 01 DOCUMENT SCOPE Network security must be addressed by every electronic systems contractor (ESC) who has responsibility for their clients networks. It is not enough to simply leave equipment on its default settings and hope for the best, as one can expose the clients networks and the hardware and data that exist on them to malicious and potentially highly destructive attacks. This document must not be seen as a complete guide to network security, but rather as guidance for a pragmatic approach. Attackers will often search for networks that have been poorly secured. By following these guidelines, ESCs can decrease the likelihood that potential attackers will attempt an attack on a client s network, and in some cases can prevent attackers from even knowing the network exists. This white paper establishes best practices for implementing wireless local area network (WLAN) security in a residential environment based on the IEEE x and standards. This document makes the assumption that a router is used between the WAN (The Internet) and LAN (Local Area Network). This can be in the form of a DSL modem/router or a router connected to a cable modem. This document will cover network security in three parts: 1. Securing the router from WAN (Internet) attack 2. Securing any wireless networks 3. Securing the LAN and individual devices 02 INTRODUCTION One of the primary benefits of wireless networking is the ease and convenience of connecting devices. This is also one of its biggest. In most cases, as soon as the integrated router or access point is connected to the modem, the wireless clients within range will immediately request and be granted connectivity, both internally and to the Internet. Unfortunately, that ease of connectivity and the fact that information is transmitted through the air makes the network vulnerable to interception and attacks. With wireless connectivity, the attacker does not need a physical connection to a computer or any of the network devices to access the network. The attacker can access the network from any location within transmission range. Once an attacker gains access to the network, they can piggyback onto Internet services, access computers on the network to damage files, or steal personal and private information. These vulnerabilities in wireless networking require manual configuration of built-in security features designed to help protect the WLAN from attacks. Many of these procedures are simple steps that should be performed during initial setup of the wireless device, as well as more advanced security configurations. Before we get into a detailed discussion on various aspects of network security, here are some basic Do s and Don ts when configuring an access point (AP): Turn off the wireless router when not in use. Whenever possible, use WPA or WPA2 security on the wireless router. Disable SSID broadcast. Always change the default administrator username and password. If possible, avoid using MAC ID filtering as it is can be laborious to enter all the addresses and it can still be hacked. If possible, do not use WEP security as it is a weak encryption standard and can be easily hacked. Do not share the administrator password with anyone besides the client. 03 SECURING THE ROUTER FROM WAN (INTERNET) ATTACKS Out of the box, most networking equipment will perform to its specification. It is essential, though, that the following is addressed: Choose a secure router. While it is not necessary to use expensive enterprise-grade equipment in a residential environment, the following considerations are essential: 2014 CEDIA 3

4 The router should have a built-in firewall. The router should be updated to the latest firmware. Consider including this as a regular chargeable maintenance item. Consider using limited-distribution product that is not readily available to the consumer market. This equipment will often be more secure. Always change the default administrator username and password on the router. Unless you or the client has an overriding and specific need, disable the ability for the router to be configured from its WAN (Internet) port. This feature exists on the majority of routers. If your router supports this feature, disable Respond to Ping from the Internet. This will make it harder for a potential attacker to identify your network from the Internet. Make sure the DMZ feature is disabled unless there is a specific requirement for using it. (The DMZ feature opens the router s firewall to all traffic and routes this traffic to a specific IP address on the local network.) When access to devices and services on the LAN is required from the WAN (Internet): NAPT (port forwarding) is the least secure method. Any attacker from the Internet will have easy access to the device that is open. Potentially, if this device s security is breached, the attacker could gain access to the entire network. In addition, all traffic on this connection is unencrypted while connected to the Internet. If used, ensure that very strong passwords are used on all open devices. VPN (virtual private network) is a much more secure method. If using a VPN, ensure that very strong passwords are used. It is also recommended that an enterprise-grade hardware device is used as the VPN endpoint. This functionality is built into the majority of enterprise-grade routers. 04 SECURING THE LAN AND INDIVIDUAL DEVICES The majority of routers come preset to use a Class C address range when issuing DHCP addresses. While a Class C ( x.x) address is entirely appropriate, consider changing the subnet from the default setting (i.e., from x to x). Ensure that no LAN network sockets are accessible from outside the property. Ensure that virus scanning and Internet security software is kept up-to-date automatically and is checked periodically for integrity. Manage the client. Educate the client and explain the potential risks from the following: Opening s from unknown sources Downloading anything from an unknown source Peer-to-peer networking software (e.g. LimeWire and Torrent software) Opening files from untrusted sources (i.e. from a CD or USB flash drive) Phishing messages that ask the user to divulge passwords and personal information 05 SECURING THE WIRELESS NETWORK SSID The SSID is used to identify the WLAN. All devices that wish to participate in the WLAN must use the same SSID. To allow easy detection of the WLAN by clients, the SSID is broadcast. It is possible to disable the broadcast feature of the SSID. If the SSID is not broadcast, wireless clients will need to have this value manually configured. A wireless host (STA) is defined as any device that contains wireless NIC (a computer hardware component that connects a computer to a computer network) and wireless client software. This client software allows the hardware to participate in the WLAN. Devices that are STAs include PDAs, ipods, laptops, desktop PCs, printers, projectors, Wi-Fi phones, and a plethora of other wireless-capable devices. In order for an STA to connect to the WLAN, the client configuration must match that of the access point (AP). This includes the SSID, security settings, and channel information if the channel was manually set on the AP. These settings are specified in the client software that manages the client connection CEDIA

5 The wireless client software is usually integrated into the device operating system but can also be stand-alone, downloadable wireless utility software specifically designed to interact with the wireless NIC. By default, the AP will broadcast the SSID, so simply changing the name provides no additional security. Once the SSID has been renamed, the broadcast feature should be disabled. This effectively shields the WLAN from public view and makes the task of connecting to the network more difficult. This alone will not fully protect the network, as the SSID is transmitted between network devices in clear text and these signals can be intercepted. There are numerous freeware tools that sniff out wireless networks in an attempt to capture and analyze packet headers, enabling the hacker to gain access to all of the information necessary to access the network. Protecting your WLAN requires a combination of several actions AND X SECURITY Key considerations for and x security include: Always change the manufacturer s default SSID, username, and password. Consider not broadcasting the SSID. Not broadcasting the SSID will keep the casual hacker from seeing the network and attempting to connect to it. One disadvantage is that the SSID will have to be manually entered into any new authorized devices that wish to access the wireless network. Once the SSID has been entered initially, it will not need to be re-entered for future access. Some APs allow for a guest account. If a guest account is used, ensure that it is secured to the same level as other networks. Make sure that all devices on the network support the chosen security method. All security methods incur bandwidth overheads that reduce throughput. WPA2 is the most recent standard on security and should be used where possible. The security technology (WEP, WPA, and WPA2) should be the same among all devices. Whenever possible, use the latest technology first (WPA2) and start working backward until you find a compatible technology that all devices support. MAC ID FILTERING Media Access Control (MAC) address filtering is perhaps the oldest security method for an AP. It relies on the fact that almost every networkable device on the planet has a unique address. Devices are defined by their MAC. This address can be added to a table of addresses that the AP will allow. If the address is not on the table, it will be denied by default. MAC ID filtering will limit access to a pre-defined list of devices. Sometimes it is the only security method that works with certain devices, as the devices themselves do not have any security configuration. One of the shortfalls of MAC ID filtering is that it is laborious to enter all of the MAC addresses into your AP. Additionally, a hacker can sniff out the MAC address and then spoof their address to be yours, thus allowing them to access your network. If there are many devices wishing to access the network, every one of these devices MAC addresses will have to be registered with every WAP. This process can be laborintensive, as each device s MAC must be loaded into the database. However, the majority of integrated routers (with AP) have the facility to poll the network for connected devices, harvest the MAC addresses, and allow the installer to individually permit or deny each device. The persistent hacker may still not be stopped, as a validated MAC address could be cloned onto an external device, defeating this automated authentication. TRAFFIC FILTERING Traffic filtering can control traffic entering or leaving the network. It can be used to permit or deny traffic to or from a specific MAC or IP address. Specific applications may be controlled using port numbers. For example, traffic filtering might be used to deny telnet traffic destined for the authentication server, preventing unauthorized access in an attempt to reconfigure the parameters CEDIA 5

6 06 AUTHENTICATION Authentication is the process of permitting access using preset credentials, most commonly the use of a username and password. On a wireless network, authentication must occur before the client is allowed to connect to the WLAN. While this process will not stop the intercept of packets, it adds a significant level of security against the casual hacker. The two most common types of wireless authentication methods are open authentication and pre-shared keys (PSK). OPEN AUTHENTICATION By default, wireless devices do not require authentication, this is open authentication. This should only be used on public networks such as those at schools, coffee shops, airports, etc. PSK Using PSK, a device wishing to connect to the network sends a request to the AP and the AP returns a challenge request. The device then uses its PSK (which must match the key on the AP) to encrypt the challenge and then returns it to the AP. The AP compares the encrypted reply to the original challenge, and if it matches, the connection process continues. If MAC address filtering is also enabled, authentication must occur first. 07 WIRELESS SECURITY PROTOCOLS Security protocols are based on the lowest common denominator. Networks with legacy equipment may not be able to mange newer encryption protocols. When in doubt, use the most universal protocol, Wired Equivalent Privacy (WEP), to check the network security process, and then upgrade to the highest possible protocol. REGULAR WEP WEP was the first wireless encryption technology developed. Be careful of WEP passphrases, as they can easily be hacked. Because the length is a set standard (64-bit [10 ASCII characters] or 128-bit [26 ASCII characters]) a hacker can easily narrow his attack and break the password more quickly. With enough data, a hacker can use software that analyzes wireless traffic to identify the WEP key (which is used to encrypt the data and does not change). If a WEP key is used, it should be strong, though there is little difference between the time it takes to crack a strong key and the time it takes to crack a weak one. WPA VERSION 1 AND 2 Wi-Fi Protected Access (WPA) and the newer Wi-Fi Protected Access 2 (WPA2) are much more secure than WEP, as they use different encryption techniques. Furthermore, they use a range for the password instead of a pre-set range as in WEP. With WPA and WPA2, a password can be anywhere between 8 and 63 ASCII characters long. Most new devices support the WPA2 standard, and many manufacturers have allowed their devices to be compatible with WPA. So, for example, you can configure your AP for WPA2, but if the client only supports WPA, it will automatically fall back to that standard. As with any encryption, WPA and WPA2 take overhead and bandwidth more so than WEP but the benefits of WPA outweigh the overhead concerns. WPA PSK is much more secure than WEP as it uses Temporal Key Integrity Protocol (TKIP), which continuously changes the key used to encrypt the data. A PSK is used to initiate the connection. This should be a strong password. In the last few years, however, attackers have devised methods to hack into this. WPA2 PSK. WPA2 is currently required for any new product to bear the Wi-Fi trademark. If all equipment on a wireless network supports WPA2 PSK, that standard should be used. Unfortunately, some current products and many legacy products do not support either WPA or WPA2. If any devices on the network do not support WPA2, consider placing the non-compliant devices on a separate VLAN which has restricted access to the rest of the network. MANAGING SIGNAL STRENGTH The network cannot be attacked if there is no wireless signal. Additionally, as signal strength decreases, so does network throughput. In balancing the need for a strong signal within the property with the need to minimize signal strength outside the property s boundary, consider the following: CEDIA

7 The use of directional wireless antennas can keep a strong signal within the boundary of the property while minimizing the signal outside of the property boundary. Many WAPs have the ability to work at a reduced transmission power. The above solutions are best set up once the client has moved in and the property is fully furnished. 08 CONCLUSIONS Security is one of the primary factors to be considered when planning a wireless network, alongside manageability, scalability, performance, and interoperability. The convenience and flexibility of wireless networking is becoming ubiquitous in the residential electronic systems industry. It is critical that personnel are aware of security threats and are properly trained to institute the necessary safeguards to protect the client s network, data, and equipment from unauthorized access. Incorrect configurations may expose the network to external access and may also reduce the overall performance of the network. It is strongly recommended that key personnel gain training and certification. CEDIA University as well as industry manufacturers offer many courses in design, installation, and configuration. 09 INFORMATIVE REFERENCES CEDIA EDUCATION CEDIA offers a range of courses to give you the real world knowledge and skills to be able to securely configure devices in an integrated IP environment in the home: EST233 Networking for Technicians EST243 IP for Technicians (Hands-On) EST333 Advanced Networking (Hands-On) EST350 Networking & IP Workshop for Integrators (Hands-On) EST253 Wireless Network Technologies ESD341 Designing Ethernet Networks CISCO CERTIFICATION Cisco education and certification offers the ideal progression from CEDIA courses for anyone interested in the application of enterprise best practices to the design and configuration of larger-scale networks in the home. With the increasingly conflicting demands of high-bandwidth streaming, conferencing, low-latency control systems, and secure access, Cisco Certifications will quickly become a must-have in the skills armory of any residential electronic systems company. 10. APPENDIX A: WIRELESS STANDARDS A number of standards have been developed to ensure that wireless devices can communicate. They specify the RF spectrum used, data rates, how the information is transmitted, and more. The main organization responsible for the creation of wireless technical standards is the Institute of Electrical and Electronics Engineers (IEEE). The IEEE standard governs the WLAN environment. There are four amendments to the IEEE standard that describe different characteristics for a, b, g and n. These technologies are referred to as Wi-Fi. The Wi-Fi Alliance is responsible for testing WLAN devices from different vendors. The Wi-Fi logo on a device means equipment should be compatible A: Uses 5 GHz RF spectrum Not compatible with 2.4 GHz spectrum; b/g/n devices Range is approximately 33% that of the b/g Relatively expensive to implement compared to other technologies Increasingly difficult to find a compliant equipment 2014 CEDIA 7

8 802.11B: First of the 2.4 GHz technologies Maximum data-rate of 11 Mbps Range of approximately 46 m (150 ft) indoors/96 m (300 ft) outdoors G: 2.4 GHz technologies Maximum data-rate increase to 54 Mbps Same range as the b Backwards compatible with b N: 2.4 and 5 GHz technologies Extends the range and data throughput Backwards compatible with existing g and b equipment (draft standard specifies a support CONSTRUCT AN INSTALLATION AND SECURITY MODEL Determine equipment location. Determine the appropriate equipment. Determine the wireless standard. Document router/ap configuration. Establish name, admin password, SSID, wireless security protocols, and authentication. SIMPLE CONFIGURATION CHECKLIST Change the factory default settings, including the admin password. Change the SSID and disable broadcast. Enable authentication with highest compatible level of encryption. Use MAC address filtering. 11 APPENDIX B: DESIGN AND IMPLENTATION OF A WIRELESS SOLUTION DETERMINE DEVICE LAYOUT, RANGE, AND SCOPE Bandwidth: How many simultaneous users are expected? What applications are expected? Coverage: Will range expansion be needed? Structural limitations: Determine the type of construction (Look for potential signal blocking). Assess existing installation and equipment CEDIA

9 12 APPENDIX C: ABBREVIATIONS USED IN THIS DOCUMENT: AP Access Point WPA Wi-Fi Protected Access ISP Internet Service Provider VPN Virtual Private Network LAN Local Area Network WAN Wide Area Network MAC Media Access Control WAP Wireless Access Point PSK Pre-shared Key WEP Wired Equivalent Privacy SSID Service Set Identifier TKIP Temporal Key Integrity Protocol VLAN Virtual Local Area Network STA Wireless Network Client such as a laptop or PDA 2014 CEDIA 9

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

Chapter 3 Safeguarding Your Network

Chapter 3 Safeguarding Your Network Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

ENHWI-N3. 802.11n Wireless Router

ENHWI-N3. 802.11n Wireless Router ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home

More information

USER GUIDE Cisco Small Business

USER GUIDE Cisco Small Business USER GUIDE Cisco Small Business WBPN Wireless-N Bridge for Phone Adapters December 2011 Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries.

More information

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for

More information

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia

More information

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 CONFIGURING YOUR HOME WIRELESS NETWORK Presented by: Mr. Eric Fan, Chairman, PISA Knowledge 123 Firmware 軟 韌 體 Knowledge 123 Home Network Functions

More information

APPENDIX 3 LOT 3: WIRELESS NETWORK

APPENDIX 3 LOT 3: WIRELESS NETWORK APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

Configuring Routers and Their Settings

Configuring Routers and Their Settings Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because

More information

IEEE G / B WIRELESS SECURITY. AMX Corporation. Wireless LAN Security: T e c h n o l o g y W h i t e P a p e r

IEEE G / B WIRELESS SECURITY. AMX Corporation. Wireless LAN Security: T e c h n o l o g y W h i t e P a p e r IEEE 802.11G / 802.11B WIRELESS SECURITY AMX Corporation Wireless LAN Security: T e c h n o l o g y W h i t e P a p e r 1 Table of Contents Table of Contents 2 Introduction 3 Wireless LAN Market Overview

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

Top 10 Security Checklist for SOHO Wireless LANs

Top 10 Security Checklist for SOHO Wireless LANs Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN

More information

ECB1220R. Wireless SOHO Router/Client Bridge

ECB1220R. Wireless SOHO Router/Client Bridge Wireless SOHO Router/Client Bridge 2.4GH 802.11 b/g 54Mbps PRODUCT DESCRIPTION ECB-1220R is a 2.4GHz 802.11b/g broadband Wi-Fi Router with advanced AP/Client Bridge/Repeater functions. So you could implement

More information

Go Wireless. Open up new possibilities for work and play

Go Wireless. Open up new possibilities for work and play Go Wireless Open up new possibilities for work and play Start with 3 pieces A typical home or small-office wireless LAN requires only 3 pieces of hardware. With these 3 pieces, you re ready to get started!

More information

User Guide. E-Series Routers

User Guide. E-Series Routers User Guide E-Series Routers Table of Contents Table of Contents Product overview E900/E1200/E1500/E2500/E3200 1 Back view 1 Bottom view 1 E4200 2 Top view 2 Back view 2 Setting Up Your E-Series Router

More information

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security

More information

LW310V2 Sweex Wireless 300N Router

LW310V2 Sweex Wireless 300N Router LW310V2 Sweex Wireless 300N Router Please notice! On the included CD-ROM you will find the Setup Wizard. This easy install procedure will show you how to setup the router step-by-step. Do not expose the

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without

More information

A Division of Cisco Systems, Inc. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL (EU/LA) Model No.

A Division of Cisco Systems, Inc. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL (EU/LA) Model No. A Division of Cisco Systems, Inc. WIRELESS Wireless-G Broadband Router User Guide Model No. WRT54GL (EU/LA) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered

More information

Chapter 2 Wireless Settings and Security

Chapter 2 Wireless Settings and Security Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless

More information

YO-301AP POE AP Datasheet

YO-301AP POE AP Datasheet YO-301AP POE AP Datasheet 300Mbps Wi-Fi Ceiling POE Access Point VER:1.0 Date:2013-06-03 1 Product Description: Practical and powerful The Ceiling PoE wireless access point for your home or office network

More information

ALL0237R. Wireless N 300Mbit Access Point/Repeater. User s Manual

ALL0237R. Wireless N 300Mbit Access Point/Repeater. User s Manual ALL0237R Wireless N 300Mbit Access Point/Repeater User s Manual ALLNET ALL0237R User Manual Table of Contents About the Device... 3 Minimum System Requirements... 5 Package Contents... 5 Device Overview...

More information

If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders. Dan Farmer, System Administrators Guide to Cracking

More information

Top 10 Security Checklist for SOHO Wireless LANs

Top 10 Security Checklist for SOHO Wireless LANs Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

NBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012

NBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012 NBG2105 Wireless Mini Travel Router Version 1.00 Edition 1, 11/2012 Quick Start Guide User s Guide LAN IP Address Default Login Details 192.168.1.1 (Router Mode) 192.168.1.2 (Other Modes) Passwordwww.zyxel.com

More information

USER GUIDE AC2400. DUAL BAND GIGABIT Wi Fi ROUTER. Model# E8350

USER GUIDE AC2400. DUAL BAND GIGABIT Wi Fi ROUTER. Model# E8350 USER GUIDE AC2400 DUAL BAND GIGABIT Wi Fi ROUTER Model# E8350 Table of Contents Product overview E8350..................................... 1 Setting Up Your E-Series Router Where to find more help.........................

More information

N600 WiFi USB Adapter

N600 WiFi USB Adapter Model WNDA3100v3 User Manual December 2014 202-11470-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial

More information

WL559E Portable 300Mbps Wireless-N Repeater

WL559E Portable 300Mbps Wireless-N Repeater WL559E Portable 300Mbps Wireless-N Repeater Aztech WL559E User Manual Table of Contents About the Device... 3 Minimum System Requirements... 6 Package Contents... 6 Device Overview... 6 Front Panel...

More information

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction This chapter describes the features of the NETGEAR ProSafe 802.11g Wireless VPN Firewall, Model FVG318. Key Features of the VPN Firewall Router The ProSafe 802.11g Wireless VPN Firewall

More information

STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address

STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address Title: How do I configure the wireless printer without a network cable and install the printer driver in Windows? NOTE: For successful wireless setup, you MUST know your network security settings. STEP

More information

DATA PROJECTOR XJ-A146/XJ-A246/XJ-A256

DATA PROJECTOR XJ-A146/XJ-A246/XJ-A256 DATA PROJECTOR XJ-A146/XJ-A246/XJ-A256 E Data Projector Wireless Function Guide Be sure to read the precautions in the Setup Guide that comes with the Data Projector. Be sure to keep all user documentation

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Broadband Router User Guide Model No. WRT54GL Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2

More information

DATA PROJECTOR XJ-A135/XJ-A145/XJ-A235/ XJ-A245

DATA PROJECTOR XJ-A135/XJ-A145/XJ-A235/ XJ-A245 DATA PROJECTOR XJ-A135/XJ-A145/XJ-A235/ XJ-A245 E Data Projector Wireless Function Guide Be sure to read the precautions in the User s Guide (Basic Operations) that comes with the Data Projector. Be sure

More information

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer

More information

DSL-2600U. User Manual V 1.0

DSL-2600U. User Manual V 1.0 DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS

More information

LevelOne WAP - 0005. User s Manual. 108 Mbps Wireless Access Point

LevelOne WAP - 0005. User s Manual. 108 Mbps Wireless Access Point LevelOne WAP - 0005 108 Mbps Wireless Access Point User s Manual TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 1 Features of your Wireless Access Point... 1 Package Contents... 3 Physical Details... 3 CHAPTER

More information

Table of Contents. Wireless Installation Considerations... 10

Table of Contents. Wireless Installation Considerations... 10 Table of Contents Table of Contents Product Overview...4 Package Contents...4 System Requirements... 4 Introduction...5 Features... 6 Hardware Overview...7 Connections... 7 LEDs... 8 Wireless Installation

More information

AC 1200. Wireless Dual Band Gigabit Router. Highlights

AC 1200. Wireless Dual Band Gigabit Router. Highlights AC 1200 Wireless Dual Band Gigabit Router Highlights Fast Wi-Fi 300Mbps on 2.4GHz + 867Mbps on 5GHz totals 1.2Gbps Wi-Fi speeds Maximum Range 2 dual band external antennas provide maximum Omni-directional

More information

Linksys WAP300N. User Guide

Linksys WAP300N. User Guide User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating

More information

Design and Implementation Guide. Apple iphone Compatibility

Design and Implementation Guide. Apple iphone Compatibility Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new

More information

PePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400

PePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400 PePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400 PePWave Surf Outdoor Series: Surf AP 200/400-X, PolePoint 400-X, Surf 400-DX User Manual Document Rev. 1.2 July 07 COPYRIGHT & TRADEMARKS

More information

wowforbusiness.com MODEM USER GUIDE Arris TG2470 and TG2472 Series Modems 7072.U.1601.O

wowforbusiness.com MODEM USER GUIDE Arris TG2470 and TG2472 Series Modems 7072.U.1601.O wowforbusiness.com MODEM USER GUIDE Arris TG2470 and TG2472 Series Modems 7072.U.1601.O Modem User Guide Table of Contents 1. Note About This User Guide...4 2. Access and Login to Modem...5 3. Basic Setup...6

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2007, 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Wireless-G. User Guide. GHz 2.4 802.11g. A Division of Cisco Systems, Inc. WIRELESS. Model No.WRT54GP2

Wireless-G. User Guide. GHz 2.4 802.11g. A Division of Cisco Systems, Inc. WIRELESS. Model No.WRT54GP2 Your Internet Telephone Company offering you more - connecting you for less A Division of Cisco Systems, Inc. GHz 2.4 802.11g Wireless-G WIRELESS User Guide Model No.WRT54GP2 Copyright and Trademarks Specifications

More information

Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual

Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual Wireless LAN Access Point IEEE 802.11g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents...2 1.2 Features...2 1.3 Specifications...2 1.4 Physical Description...3 Chapter

More information

Wireless-G. GHz 2.4 802.11g. Broadband Router with 2 Phone Ports. Installation and Troubleshooting Guide WRT54GP2. VoIP

Wireless-G. GHz 2.4 802.11g. Broadband Router with 2 Phone Ports. Installation and Troubleshooting Guide WRT54GP2. VoIP A Division of Cisco Systems, Inc. GHz 2.4 802.11g VoIP Wireless-G Broadband Router with 2 Phone Ports Installation and Troubleshooting Guide Model No. WRT54GP2 Copyright and Trademarks Specifications are

More information

WL-5460AP. User s Manual. 54Mbps Multi-Function Wireless AP. AirLive WL-5460AP v2 User Manual

WL-5460AP. User s Manual. 54Mbps Multi-Function Wireless AP. AirLive WL-5460AP v2 User Manual WL-5460AP 54Mbps Multi-Function Wireless AP User s Manual 1 Copyright The contents of this publication may not be reproduced in any part or as a whole, stored, transcribed in an information retrieval system,

More information

Particularities of security design for wireless networks in small and medium business (SMB)

Particularities of security design for wireless networks in small and medium business (SMB) Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, tomai@econ.ubbcluj.ro

More information

TRENDnet User s Guide. Cover Page

TRENDnet User s Guide. Cover Page Cover Page Table of Contents Table of Contents... 2 Product Overview... 4 Package Contents... 4 Features... 4 Product Hardware Features... 5 Application Diagram... 7 Router Setup... 7 Creating a Home Network...

More information

Table of Contents. Wireless Security...40 What is WEP?...40 Configure WEP...41 What is WPA?...42 Configure WPA-PSK (Personal)... 43.

Table of Contents. Wireless Security...40 What is WEP?...40 Configure WEP...41 What is WPA?...42 Configure WPA-PSK (Personal)... 43. Table of Contents Table of Contents Product Overview...4 Package Contents...4 System Requirements... 4 Introduction...5 Features... 6 Hardware Overview...7 Connections... 7 LEDs...8 Configuration...9 Web-based

More information

Network Connections and Wireless Security

Network Connections and Wireless Security Network Connections and Wireless Security This chapter explains how to use your Wireless Adapter to connect to your Wireless Local Area Network (WLAN) and how to set up wireless security for the Wireless

More information

Introduction. Quick Installation Guide. Section 1. Connecting the Router. Wireless N 3G / 3.5G Mobile Router. Model # AR660W3G

Introduction. Quick Installation Guide. Section 1. Connecting the Router. Wireless N 3G / 3.5G Mobile Router. Model # AR660W3G Introduction Quick Installation Guide Wireless N 3G / 3.5G Mobile Router Model # AR660W3G Congratulations on your purchase of AR660W3G Wireless N 3G/3.5G Mobile Router. This product is specifically designed

More information

AC1200 Multi-Function Concurrent Dual-Band Gigabit Wi-Fi Router

AC1200 Multi-Function Concurrent Dual-Band Gigabit Wi-Fi Router The extraordinary growth in the number of wireless devices found in modern homes has seen a huge increase in demand for wireless speed, range and bandwidth. This continuing trend away from wired connections

More information

TRENDnet User s Guide. Cover Page

TRENDnet User s Guide. Cover Page Cover Page Table of Contents Table of Contents... 2 Product Overview... 4 Package Contents... 4 Features... 4 Product Hardware Features... 5 Application Diagram... 7 Router Setup... 7 Creating a Home Network...

More information

PCI Wireless Compliance with AirTight WIPS

PCI Wireless Compliance with AirTight WIPS A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use

More information

SonicWALL Makes Wireless Networking Secure

SonicWALL Makes Wireless Networking Secure SonicWALL Makes Wireless Networking Secure Defines the Challenges Facing Organizations Interested in Deploying Wireless Network Security CONTENTS Abstract 1 The Demand for Wireless 1 IT Concerns No Small

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. User Guide. Access Point with Power Over Ethernet WIRELESS WAP54GP. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. User Guide. Access Point with Power Over Ethernet WIRELESS WAP54GP. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with Power Over Ethernet User Guide Model No. WAP54GP Copyright and Trademarks Specifications are subject to change without

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

AC 750. Wireless Dual Band 4G LTE Router. Highlights

AC 750. Wireless Dual Band 4G LTE Router. Highlights AC 750 Wireless Dual Band 4G LTE Router Highlights Share Your 4G LTE Network Share your 4G LTE network with multiple Wi-Fi devices and enjoy download speeds of up to 150Mbps Great Coverage Powerful, integrated

More information

ECB3500 2.4GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/

ECB3500 2.4GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/ Wireless Long Range Multi-function 7+1 AP ECB3500 2.4GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/ EIRP up to 2000mW WDS Bridge/Client Router/AP Router ECB3500 is a powerful, enhanced,

More information

IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. www.edge-core.com. Software Release v2.0.0.1

IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. www.edge-core.com. Software Release v2.0.0.1 IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320 Management Guide Software Release v2.0.0.1 www.edge-core.com Management Guide ECW5320 Indoor Enterprise Access Point IEEE 802.11a/ac/n/b/g

More information

Ensuring HIPAA Compliance in Healthcare

Ensuring HIPAA Compliance in Healthcare The Intelligent Wireless Networking Choice WHITE PAPER Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors,

More information

AC 1900. Wireless Dual Band Gigabit Router. Highlights

AC 1900. Wireless Dual Band Gigabit Router. Highlights AC 1900 Wireless Dual Band Gigabit Router Highlights Superfast Wi-Fi 600Mbps on 2.4GHz + 1300Mbps on 5GHz totals 1.9Gbps Wi-Fi speeds Maximum Range 3 dual band detachable antennas provide maximum Omni-directional

More information

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE 12/11/2012 Index 1 INTRODUCTION... 1-1 2 FACTORY DEFAULT SETTINGS... 2-1 3 CPE BASIC OPERATIONS... 3-1 3.1 PASSWORD MODIFICATION...

More information

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Hackers can easily trap information transmitted over wireless network, it has to be encrypted to avoid unauthorized users

More information

Enterprise Solutions for Wireless LAN Security Wi-Fi Alliance February 6, 2003

Enterprise Solutions for Wireless LAN Security Wi-Fi Alliance February 6, 2003 Enterprise Solutions for Wireless LAN Security Wi-Fi Alliance February 6, 2003 Executive Summary The threat to network security from improperly secured WLANs is a real and present danger for today s enterprises.

More information

AC 3200. Wireless Tri-Band Gigabit Router. Highlights

AC 3200. Wireless Tri-Band Gigabit Router. Highlights AC 3200 Wireless Tri-Band Gigabit Router Highlights Tri-Band technology Three separate Wi-Fi bands for connecting more devices to your network without a drop in performance Up to 3200Mbps Wi-Fi speed 600Mbps

More information

Wireless-N. User Guide. Broadband Router WRT300N (EU/LA) WIRELESS. Model No.

Wireless-N. User Guide. Broadband Router WRT300N (EU/LA) WIRELESS. Model No. 2,4 GHz WIRELESS Wireless-N Broadband Router User Guide Model No. WRT300N (EU/LA) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 9, Sep 2015, pp. 65-74, Article ID: IJECET_06_09_008 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=9

More information

A6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual

A6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual 802.11ac USB 3.0 Dual Band User Manual August 2014 202-11373-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

HP M220 802.11n Access Point Configuration and Administration Guide

HP M220 802.11n Access Point Configuration and Administration Guide HP M220 802.11n Access Point Configuration and Administration Guide HP Part Number: 5998-3140 Published: September 2012 Edition: 1 Copyright 2012 Hewlett-Packard Development Company, L.P. The information

More information

WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012

WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012 WRE2205 Wireless N300 Range Extender Version 1.00 Edition 1, 06/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com 1234 Copyright

More information

STEP III: Connect the printer via network cable and configure the wireless network card

STEP III: Connect the printer via network cable and configure the wireless network card How do I configure the wireless printer with the temporary use of a network cable and install the printer driver in Windows? NOTE: For successful wireless setup, you will need to have a network cable for

More information

Downloaded from manuals search engine. 3G Wireless-N Router USER GUIDE

Downloaded from  manuals search engine. 3G Wireless-N Router USER GUIDE 3G Wireless-N Router USER GUIDE NOTICE This document contains proprietary information protected by copyright, and this Manual and all the accompanying hardware, software, and documentation are copyrighted.

More information

Version 1.0 06/24/2013. User Manual. Wireless N 150 Home Router

Version 1.0 06/24/2013. User Manual. Wireless N 150 Home Router Version 1.0 06/24/2013 User Manual Wireless N 150 Home Router Preface D-Link reserves the right to revise this publication and to make changes in the content hereof without obligation to notify any person

More information

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.

More information

What is Bitdefender BOX?

What is Bitdefender BOX? Quick Setup Guide What is Bitdefender BOX? Think about Bitdefender BOX like an antivirus for your network. It s a hardware device that sits next to your Wi-Fi router and protects all Internet connected

More information

your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Configuring Installing

your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Configuring Installing your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Installing Configuring Contents 1 Introduction...................................................... 1 Features...........................................................

More information

EAP N Wall Mount Access Point / WDS AP / Universal Repeater

EAP N Wall Mount Access Point / WDS AP / Universal Repeater EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at

More information

Protecting the Home Network (Firewall)

Protecting the Home Network (Firewall) Protecting the Home Network (Firewall) Basic Tab Setup Tab DHCP Tab Advanced Tab Options Tab Port Forwarding Tab Port Triggers Tab DMZ Host Tab Firewall Tab Event Log Tab Status Tab Software Tab Connection

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

TRENDnet User s Guide. Cover Page

TRENDnet User s Guide. Cover Page Cover Page Contents Product Overview... 1 Package Contents... 1 Features... 1 Product Hardware Features... 2 Application Diagram... 4 Basic Router Setup... 5 Creating a Home Network... 5 Router Installation...

More information

Conceptronic 150N Wireless LAN Access Point User s Manual Version: 1.0

Conceptronic 150N Wireless LAN Access Point User s Manual Version: 1.0 Conceptronic 150N Wireless LAN Access Point User s Manual Version: 1.0 Contents Chapter I: Product Information 2 1-1. Product introduction 2 1-2. Safety Information 3 1-3. Package Contents 3 1-4. Familiar

More information

You must first login to your router to configure the settings. 2. The Modem Router s host screen appears. Click Manual Setup.

You must first login to your router to configure the settings. 2. The Modem Router s host screen appears. Click Manual Setup. You must first login to your router to configure the settings. The Modem Router s host screen appears. Click Manual Setup. screen. Click Wireless Setup. 14 Chapter 3 Wireless Settings 4. The Wireless Setup

More information

Wireless Encryption Protection

Wireless Encryption Protection Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost

More information