Wi-Fi and security Wireless Networking and Security by Alain RASSEL

Size: px
Start display at page:

Download "Wi-Fi and security Wireless Networking and Security by Alain RASSEL"

Transcription

1 Wi-Fi and security Wireless Networking and Security by Alain RASSEL

2 Overview: Simple configuration example Obvious simple protection means Change Administrator Password Restrict administrator access to trusted interface Network Structures Single firewalled internet attached computer What does a firewall do? Internet attached NAT'ted network with wired router DNS name, IP address and MAC address More about MAC addresses and DHCP NAT function Why NAT acts as a client firewall How to dig holes into a NAT firewall

3 Overview continued. Internet attached NAT'ted network with wireless router Wi-Fi: the problem zone Simple access protection means Infrastructure mode Physical location ESSID protection Disabling DHCP Non-standard IP address MAC address filter Why use these methods? Dissuasion Data securing with individual firewalls WEP encryption is insecure WPA is still secure Conclusions

4 Simple setup: part 1 Wi-Fi and Security

5 Simple setup: part 2 Wi-Fi and Security

6 Simple setup: part 3 Wi-Fi and Security

7 Obvious simple protection Set/Change Administrator Password The default passwords for standard equipment are the first ones to be tried out by crackers. Restrict administration authorization to computers on trusted interface This should not, unless specially secured, be the wireless interface. If no computer resides permanently on trusted interface, repeat simple setup procedure connection in case of administration needs.

8 Single firewalled internet attached computer All data exchanged are filtered by the computer internal firewall Public Area : probable threats Internet Single public IP address Firewall in the computer User Programs Computer to be protected

9 What does a firewall do? Computers on the Internet exchange DATA PACKETS between PORTS using PROTOCOLS. A PORT is like a mailbox for sending or receiving a DATA PACKET. A PROTOCOL is a data exchange procedure. TCP (Transport Control Protocol) is like a registered letter: you are sure the recipient receives the packet UDP (User Datagram Protocol) is like an unregistered letter: the recipient must confirm he received the data A specific program inside the computer listens to a port/protocol and sends his packets to his correspondent from a certain port. Example: the web server (e.g. APACHE) listens for requests on port 80, and sends his data back to the originating port from which the browser (e.g. Internet Explorer or Mozilla) originated the request. A client FIREWALL simply blocks all incoming ports, so that our programs do not receive any packets from external computers. The only accepted packets are the ones that are sent in response to our packets, i.e. we only consider answers from computers/programs that we have spoken to first. As we are a client, not a server, no external machine can take the initiative to communicate with us. This would keep programs like P2P file sharing and games from working, so some HOLES must be opened for allowing external access to them.

10 Internet attached NAT'ted private network Data exchanged pass the router with Network Address Translation layer Public Area : probable threats Internet Single public IP address ROUTER firewall NAT layer DHCP server Private IP addresses 10.z.y.x DHCP served y.x x User computer User computer User computer Private area: Computers to be protected

11 DNS name, IP address and MAC address Computer (DNS) Name: e.g. Translation by DNS (Domain Name System). Usually static name attribution, sometimes dynamic attribution by DHCP server. The IP (Internet Protocol) address (e.g ) contains all information to make a computer reachable from anywhere in the internet. Translation in case of ethernet or wireless by ARP (Address Resolution Protocol). Initial IP address attribution static or by DHCP server. The Interface address, also called Media Access Control or MAC address (e.g. 67:8A:BC:DE:F0:12) is specific to the physical communication media used ( e.g. ethernet or wi-fi). In the case of a point-to-point link (e.g. modem connection) it does not even exist.

12 More about MAC adresses and DHCP Programs on different computers talk to each other using ports, protocols and IP adresses, but on the ethernet (and also the wi-fi) physical level, the interfaces talk to each other using MAC addresses. Ethernet example: two computers on the same ethernet: Computer A with IP and MAC 01:02:03:04:05:06 wants to talk to computer B with IP from which he knows that he is on the same ethernet, but whose MAC address he does not know sends an ARP (Address Resolution Protocol) ethernet broadcast over his interface : ARP-who-is ? is listening to all ethernet broadcasts, he recognizes his IP address and answers: I am have MAC 11:12:13:14:15:16 How does a computer know his own IP address? It has been statically configured. Easiest way, but if we give two computers the same IP address, both will answer the ARP request,and so will become unreacheable. A central DHCP (Dynamic Host Configuration Protocol) server keeps book and hands out the IP address on request (ethernet broadcast). Our client computer then does not need to know what network he is in, and he is sure to receive an address the other computers in the same net consider reachable.

13 How NAT works Standard IP communication Masqueraded hosts

14 Why NAT acts as firewall The client-type firewall keeps external computers from initiating connections. A NAT layer fills the same purpose, because: NAT translation entries in the router are only generated on the initiative of the masqueraded computers, not on the initiative of external computers. The NAT layer hides the IP addresses behind the router: no external computer can initiate an exchange with a protected computer, as there is no port translation entry in the NAT table at that time. Making holes into a NAT firewall is more complicated, it can be done by: Static permanent port forwarding: always forward a certain port to a certain fixed host. This is generally called a DMZ (DeMilitarized Zone) host. Used for many P2P programs. Disadvantage: if the DMZ host can be cracked via that port (i.e. the listening program), the attacker has an operations base in the (now in)secure zone. Dynamic temporary port forwarding: Port Triggering (FTP=File Transfer Protocol, many games,etc.) UPnP (Universal Plug-and-Play, used for many other games)

15 Internet attached NAT'ted network with wireless router Wireless area adds complexity Public Area : probable threats Internet additional discrimination and protection layer needed threat Only possible in AdHoc mode ok ok Forbidden in Infrastructure mode ok Private area: Computers to be protected ok Wireless area: Mix of threat and computers to be protected

16 WI-FI : the problem zone Without wi-fi, it is easy: the private computers can be trusted and must be protected from the external, internet computers. The private computers are physically secure, we checked them and connected them to the trusted zone. With wi-fi, we cannot trust all computers within reach of our access point. So, on one hand, we want to consider our own wireless computer secure, grant it full access to the safe zone and protect it from the internet, but on the other hand, we want to deny a hostile computer in reach of our access point the same privileges. We cannot use the traditional firewall on the wi-fi interface of the access point, as the possible intruders are in the same zone as our client station. Another problem is data confidentiality:all packets are transmitted over radio waves, any station can eavesdrop on them. So we must find a way to allow only our computer to talk to the access point, to keep the access point from relaying packets from unauthorized stations, and to make the data transmitted between the access point and our computer unuseable for eavesdroppers.

17 Simple access control means In order to prevent uncontrolled direct (i.e. not going through the access point) communication between our wireless station and a rogue station within its radio reach, restrict our station to Infrastructure mode and disable AdHoc mode. Place the access point in the center of the area to be covered: physical distance will make communication harder for rogue stations. However do not feel completely protected because of this: any metal object larger than 12.5cm will reflect the radio waves, so their reach is not always limited by obvious line of sight obstacles! If a consumer parabolic dish can receive similar frequencies from a Radio-TV satellite 36000km away, it is obvious that on a free line of sight such a dish can be used to listen in on wi-fi from many kilometers away! Prevent the access point from broadcating its ESSID, and manually set the ESSID to the same value on your station. The ESSID is a token meant to identify all participants in a wireless net. If the access point does not broadcast the ESSID, the station must know it to be accepted by the access point. However do not feel completely protected because of this: An eavesdropper can intercept the value of the ESSID your station sends to the access point, and use it for himself later!

18 More simple access controls Obfuscate the IP addresses of your internal network, so as to prevent the intruder from knowing what IP address to use to be accepted. Disable the DHCP server on the wireless interface and give a fixed IP address to your wireless station. Do not use as internal network the standard preset of your access point (typically x or x) but another subnet in the acceptable range. However, do not feel completely protected because of this: An eavesdropper will find out what IP address your station used, and can use the same one once your station stops transmitting! Activate the MAC address filter on the wireless interface and restrict access to the MAC adresses of your computer(s) However, do not feel completely protected because of this: By eavesdropping on the ARP broadcasts, an intruder can find out the authorized MAC address(es). As many wireless cards allow the reconfiguring of their MAC address, if the intruder has such a card, he will reconfigure it to broadcast an authorized MAC address he obtained in the step above!

19 Why use these methods? If none of the previous methods is completely secure, why should they be used? Every single of one of the previous measures makes it more difficult and tedious to penetrate the wireless network. Even if you cannot be completely secure, the odds that a casual attacker will de dissuaded from this target and driven to an easier prey are quite good. A determined attacker will not be deterred by these means, so they are no good to protect important data from access or damage (bank account details, etc.) What can be done to keep data secure in a wireless network? Do not trust any computer on your wireless network, fit out every computer in the supposedly secure zone with an individual firewall, just as if it were connected to the internet. This will keep your data safe, but not keep an intruder from using your internet access. The chances that an intruder who only wants to use your internet access will be driven away by the previous measures are however quite high.

20 What about WEP encryption? In principle, if we can encrypt the communication between the access point and our station, the intruder has lost: none of the previous attacks will succeed, and we are safe. However, we need an unbreakable encryption scheme, because a broken encryption scheme provides no more protection than the hassle to use a penetration program, normally readily available on the internet. A strong encryption scheme means more processing power is needed to implement it in the access point, so the hardware of the access point becomes more expensive. Unfortunately the original scheme deployed in wireless devices is a weak scheme, called WEP (Wired Equivalent Privacy). In the beginning the methods used to break the scheme needed listening in on a station for several days, so one could at least be safe by changing the keys every day. Nowadays it takes programs such as AIRSNORT less than an hour to crack WEP even with a 128 bit key, so changing the keys every day is no real protection anymore. This puts WEP in the same efficiency category as the other simple dissuasion methods.

21 Are there no better encryption methods? Yes, in particular WPA (stands for WI-FI Protected Access). WPA needs however more processing power than WEP, so not every old access point is upgradeable and not every new one has it implemented. Not only the access point must support WPA, but the driver of the wireless station card must also be able to use it. If you have not yet bought your wireless equipment, make sure it fully supports WPA. WPA comes in two flavours: WPA-PSK (Pre-Shared Key) which depends on a secure secret key being shared between the access point and the station. If the key is chosen too simple, the encryption can be broken via a dictionary attack (program already available on the internet). It is of utmost importance to choose a non-obvious, long enough (20 characters or more) for WPA-PSK to be secure. WPA with RADIUS server. This entails an infrastructure too complex for this presentation. WPA has a small theoretical weakness that nobody has exploited yet. Because of this weakness an improved standard, WPA2 is currently being readied. For completeness' sake, we mention a technique called 'end-to-end encryption via VPN ' that can be used, along with an appropriate network structure, to integrate a wireless station securely into the safe net. This technique does not however prevent abuse of the internet connection.

22 Conclusions Complete security can only be achieved through the use of WPA, with a strong password in the case of WPA-PSK. Data security can be achieved by considering the private network insecure and putting an individual firewall on every computer. Simple measures will probably dissuade a casual attacker from stealing bandwidth while the data is secure behind the individual firewalls. WEP can only be counted as a dissuasion measure against a casual attacker, not as a secure protection. And the META-CONCLUSIONS: Every security feature is a trade-off between the amount of threat it averts and the hassle it is to implement! Where security is the concern, paranoïa is not a disease, but a survival trait!

Wireless Encryption Protection

Wireless Encryption Protection Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost

More information

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

Chapter 3 Safeguarding Your Network

Chapter 3 Safeguarding Your Network Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract

More information

DV230 Web Based Configuration Troubleshooting Guide

DV230 Web Based Configuration Troubleshooting Guide DV230 Web Based Configuration Troubleshooting Guide 1. Login settings After getting a DHCP IP address from your P1 W1MAX Modem DV-230), open any Internet browser and type in the URL address: http://10.1.1.254

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.

More information

home networking series Advanced manual - HOME NETWORKING WWW.EMINENT-ONLINE.COM

home networking series Advanced manual - HOME NETWORKING WWW.EMINENT-ONLINE.COM home networking series Advanced manual - HOME NETWORKING WWW.EMINENT-ONLINE.COM TABLE OF CONTENTS Table of contents...1 Why an Eminent advanced manual?...2 Your tips and suggestions in the Eminent Advanced

More information

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Hackers can easily trap information transmitted over wireless network, it has to be encrypted to avoid unauthorized users

More information

Particularities of security design for wireless networks in small and medium business (SMB)

Particularities of security design for wireless networks in small and medium business (SMB) Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, tomai@econ.ubbcluj.ro

More information

Chapter 2 Wireless Settings and Security

Chapter 2 Wireless Settings and Security Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless

More information

Configuring Routers and Their Settings

Configuring Routers and Their Settings Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because

More information

Link Layer and Network Layer Security for Wireless Networks

Link Layer and Network Layer Security for Wireless Networks Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.

More information

108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL

108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL 108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL Contents 1. Overview...1 1.1 Product Feature...1 1.2 System Requirements...1 1.3 Applications...1 2. Getting Start...2 2.1 Know the 108Mbps Wireless

More information

Protecting the Home Network (Firewall)

Protecting the Home Network (Firewall) Protecting the Home Network (Firewall) Basic Tab Setup Tab DHCP Tab Advanced Tab Options Tab Port Forwarding Tab Port Triggers Tab DMZ Host Tab Firewall Tab Event Log Tab Status Tab Software Tab Connection

More information

LevelOne WBR-3405TX. User`s Manual. 11g Wireless AP Router

LevelOne WBR-3405TX. User`s Manual. 11g Wireless AP Router LevelOne WBR-3405TX 11g Wireless AP Router User`s Manual Contents 1. Overview...4 1.1 Product Feature...4 1.2 System Requirements...4 1.3 Applications...4 2. Getting Start...5 2.1 Know the 11g Wireless

More information

If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders. Dan Farmer, System Administrators Guide to Cracking

More information

Exam Questions SY0-401

Exam Questions SY0-401 Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened

More information

How to configure your Thomson SpeedTouch 780WL for ADSL2+

How to configure your Thomson SpeedTouch 780WL for ADSL2+ How to configure your Thomson SpeedTouch 780WL for ADSL2+ Connecting up your router This guide assumes that you have successfully: unpacked your router connected it up to your phone socket using the DSL

More information

Enterprise Solutions for Wireless LAN Security Wi-Fi Alliance February 6, 2003

Enterprise Solutions for Wireless LAN Security Wi-Fi Alliance February 6, 2003 Enterprise Solutions for Wireless LAN Security Wi-Fi Alliance February 6, 2003 Executive Summary The threat to network security from improperly secured WLANs is a real and present danger for today s enterprises.

More information

Designing AirPort Extreme Networks

Designing AirPort Extreme Networks Designing AirPort Extreme Networks Contents 1 Getting Started 5 About AirPort 5 How AirPort Works 6 How Wireless Internet Access Is Provided 6 Configuring AirPort Extreme Base Station Internet Access

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

TECHNICAL NOTE REFERENCE DOCUMENT. Improving Security for Axis Products. Created: 4 October 2007. Last updated: 11 October 2007. Rev: 1.

TECHNICAL NOTE REFERENCE DOCUMENT. Improving Security for Axis Products. Created: 4 October 2007. Last updated: 11 October 2007. Rev: 1. TECHNICAL NOTE REFERENCE DOCUMENT Improving Security for Axis Products Created: 4 October 2007 Last updated: 11 October 2007 Rev: 1.0 TABLE OF CONTENTS 1 INTRODUCTION 3 2 BEST-PRACTICE SECURITY POLICIES

More information

ENHWI-N3. 802.11n Wireless Router

ENHWI-N3. 802.11n Wireless Router ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home

More information

Chapter 1 Configuring Internet Connectivity

Chapter 1 Configuring Internet Connectivity Chapter 1 Configuring Internet Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration

More information

LOHU 4951L Outdoor Wireless Access Point / Bridge

LOHU 4951L Outdoor Wireless Access Point / Bridge LOHU 4951L Outdoor Wireless Access Point / Bridge Version 2.3 ------------------------------------------------------------------------------------------------------- -1- Software setup and configuration

More information

WLAN Security Networking with Confidence

WLAN Security Networking with Confidence WLAN Security Networking with Confidence Introduction So you ve just installed a new wireless local area network (WLAN) in your small business or home. The access point is on and connected, the client

More information

A Division of Cisco Systems, Inc. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL (EU/LA) Model No.

A Division of Cisco Systems, Inc. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL (EU/LA) Model No. A Division of Cisco Systems, Inc. WIRELESS Wireless-G Broadband Router User Guide Model No. WRT54GL (EU/LA) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered

More information

WL830RT4 Wireless G Broadband Router

WL830RT4 Wireless G Broadband Router WL830RT4 Wireless G Broadband Router User Manual VERSION 1.0 Contents About the Manual... 6 About the Router... 7 Specifications...8 Requirements...9 Device Design...9 Front Panel...9 Rear Panel...10 Getting

More information

Securing your Linksys WRT54G

Securing your Linksys WRT54G Securing your Linksys WRT54G Abstract Current implementations of the 802.11b and 802.11g wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms in these

More information

DSL-2600U. User Manual V 1.0

DSL-2600U. User Manual V 1.0 DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS

More information

Chapter 5 Customizing Your Network Settings

Chapter 5 Customizing Your Network Settings Chapter 5 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax NEXT Wireless Router WNR834B, including LAN, WAN, and routing settings.

More information

LTE Internet (Installed)

LTE Internet (Installed) LTE Internet (Installed) 1 Getting Started... 1 1.1 Basic Concepts... 3 1.2 Contents of the HBR Box... 4 1.3 Getting to Know the HBR... 5 1.3.1 Front Panel... 6 1.3.2 Back Panel...10 2 Setup... 12 2.1

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security

More information

N150 WiFi Router (N150R)

N150 WiFi Router (N150R) Easy, Reliable & Secure N150 WiFi Router (N150R) User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-11000-01 v1.0 Trademarks Brand and product names are trademarks or registered

More information

Wireless LAN Security Mechanisms

Wireless LAN Security Mechanisms Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group jingan.xu@tu-ilmenau.de, mitsch@tu-ilmenau.de Abstract.

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol

More information

N150 Wireless ADSL2+ Modem Router N150RM

N150 Wireless ADSL2+ Modem Router N150RM Easy, Reliable & Secure N150 Wireless ADSL2+ Modem Router N150RM User Manual 350 East Plumeria Drive San Jose, CA 95134 USA December 2012 202-11139-01 v1.0 N150 WiFi Router (N150R) Trademarks Brand and

More information

Wireless Cable Gateway CG3100Dv3

Wireless Cable Gateway CG3100Dv3 Wireless Cable Gateway CG3100Dv3 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA October 2011 202-10942-01 v1.0 2011 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,

More information

NBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012

NBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012 NBG2105 Wireless Mini Travel Router Version 1.00 Edition 1, 11/2012 Quick Start Guide User s Guide LAN IP Address Default Login Details 192.168.1.1 (Router Mode) 192.168.1.2 (Other Modes) Passwordwww.zyxel.com

More information

How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?

How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)? Is it really necessary for the three ports mentioned in Troubleshooting (UDP 88, UDP 3074, and TCP 3074) to be opened for Xbox Live to work properly? Most cable/dsl routers implement Network Address Translation

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Broadband Router User Guide Model No. WRT54GL Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

AC1900, N900, and N450 WiFi Cable Data Gateways

AC1900, N900, and N450 WiFi Cable Data Gateways AC1900, N900, and N450 WiFi Cable Data Gateways Models C6300BD, CG4500BD, and CG3000Dv2 User Manual March 2015 202-11434-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting

More information

Linksys E800. User Guide

Linksys E800. User Guide User Guide Contents Contents Product overview Package contents 1 Features 1 Back view 2 Bottom view 2 Setting Up: Basics How to create a home network 3 What is a network? 3 How to set up a home network

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Access Control in Home Networking

Access Control in Home Networking Access Control in Home Networking Jukka Tornberg Helsinki University of Technology jstornbe@cc.hut.fi Abstract The Home Networking is coming more and more popular all the time. In the past, a home network

More information

University of Hawaii at Manoa Professor: Kazuo Sugihara

University of Hawaii at Manoa Professor: Kazuo Sugihara University of Hawaii at Manoa Professor: Kazuo Sugihara Assignment 2 (ICS426) Network Setup Tutorials By: Yu Fong Okoji (yokoji@hawaii.edu) 10/27/2009 Tutorial on Home Network Setup INTRODUCTION In this

More information

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security

More information

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 9, Sep 2015, pp. 65-74, Article ID: IJECET_06_09_008 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=9

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

Nokia Siemens Networks. CPEi-lte 7212. User Manual

Nokia Siemens Networks. CPEi-lte 7212. User Manual Nokia Siemens Networks CPEi-lte 7212 User Manual Contents Chapter 1: CPEi-lte 7212 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the CPEi-lte 7212... 1-2 Back of the CPEi-lte

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

Cisco Secure PIX Firewall with Two Routers Configuration Example

Cisco Secure PIX Firewall with Two Routers Configuration Example Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Table of Contents. Wireless Installation Considerations... 10

Table of Contents. Wireless Installation Considerations... 10 Table of Contents Table of Contents Product Overview...4 Package Contents...4 System Requirements... 4 Introduction...5 Features... 6 Hardware Overview...7 Connections... 7 LEDs... 8 Wireless Installation

More information

Tutorial 3. June 8, 2015

Tutorial 3. June 8, 2015 Tutorial 3 June 8, 2015 I. Basic Notions 1. Multiple-choice (Review Questions Chapter 6, 8 and 11) 2. Answers by a small paragraph (Chapter 2: viruses: MBR, rootkits, ) Multiple choice X. Which is the

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

Connecting to and Setting Up a Network

Connecting to and Setting Up a Network Chapter 9 Connecting to and Setting Up a Network Reviewing the Basics 1. How many bits are in a MAC address? 48 bits 2. How many bits are in an IPv4 IP address? In an IPv6 IP address? 32 bits, 128 bits

More information

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 CONFIGURING YOUR HOME WIRELESS NETWORK Presented by: Mr. Eric Fan, Chairman, PISA Knowledge 123 Firmware 軟 韌 體 Knowledge 123 Home Network Functions

More information

ZyAIR G-2000 Plus 802.11g Wireless 4-port Router Quick Start Guide

ZyAIR G-2000 Plus 802.11g Wireless 4-port Router Quick Start Guide ZyAIR G-2000 Plus 802.11g Wireless 4-port Router Quick Start Guide Version 3.60 3/2005 Table of Contents 1 Introducing the ZyAIR... 3 2 Hardware Connections... 4 2.1 Side Panel and Connections... 4 2.2

More information

Go Wireless. Open up new possibilities for work and play

Go Wireless. Open up new possibilities for work and play Go Wireless Open up new possibilities for work and play Start with 3 pieces A typical home or small-office wireless LAN requires only 3 pieces of hardware. With these 3 pieces, you re ready to get started!

More information

Quick Installation Guide

Quick Installation Guide V2.01 IP Wired / Wireless Camera Quick Installation Guide (For Windows OS) Model: FI8602/FI8602W ShenZhen Foscam Intelligent Technology Co., Ltd Packing List Quick Installation Guide 1) IP CAMERA X 1 2)

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Configuring Installing

your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Configuring Installing your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Installing Configuring Contents 1 Introduction...................................................... 1 Features...........................................................

More information

Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual

Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual Wireless LAN Access Point IEEE 802.11g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents...2 1.2 Features...2 1.3 Specifications...2 1.4 Physical Description...3 Chapter

More information

Table of Contents. Wireless Security...40 What is WEP?...40 Configure WEP...41 What is WPA?...42 Configure WPA-PSK (Personal)... 43.

Table of Contents. Wireless Security...40 What is WEP?...40 Configure WEP...41 What is WPA?...42 Configure WPA-PSK (Personal)... 43. Table of Contents Table of Contents Product Overview...4 Package Contents...4 System Requirements... 4 Introduction...5 Features... 6 Hardware Overview...7 Connections... 7 LEDs...8 Configuration...9 Web-based

More information

WiFi Cable Modem Router C3700

WiFi Cable Modem Router C3700 User Manual Note: This document is for certification purposes only. Images are for position only and might differ from the actual product. October 2013 350 East Plumeria Drive San Jose, CA 95134 USA Support

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

ESR-9750. (Go Green Series) Wireless-N Broadband Router / AP / Repeater. 2.4 GHz 802.11b/g/n 300 Mbps

ESR-9750. (Go Green Series) Wireless-N Broadband Router / AP / Repeater. 2.4 GHz 802.11b/g/n 300 Mbps PRODUCT DESCRIPTION ESR-9750 is a Wireless 11N Broadband Router that delivers up to 6x faster speeds and 3x extended coverage than 802.11g devices. ESR-9750 supports home network with superior throughput

More information

running operation mode painless TECHNICAL SPECIFICATION WAN/LAN: One 10/100 Fast Ethernet RJ-45 WPS (WiFi Protected Setup) WAN (Internet connection)

running operation mode painless TECHNICAL SPECIFICATION WAN/LAN: One 10/100 Fast Ethernet RJ-45 WPS (WiFi Protected Setup) WAN (Internet connection) PRODUCT DESCRIPTION ETR9350 is a 2T2R Wireless Single chip 11N Travel AP/Router that delivers up to 6x faster speeds than 802.11g devices. ETR9350 drives superior performance and unparalleled wireless

More information

ALL1682511. 500Mbits Powerline WLAN N Access Point. User s Manual

ALL1682511. 500Mbits Powerline WLAN N Access Point. User s Manual ALL1682511 500Mbits Powerline WLAN N Access Point User s Manual Contents 1. Introduction...1 2. System Requirements...1 3. Configuration...1 4. WPS...9 5. Wireless AP Settings...9 6. FAQ... 15 7. Glossary...

More information

Wireless Broadband Router MI424WR. User s Manual

Wireless Broadband Router MI424WR. User s Manual Wireless Broadband Router MI424WR User s Manual Table of Contents 1 Introduction 1 Package Contents 1 Minimum System Requirements 2 Features 2 Getting to Know the Router 4 2 Connecting the Router 9 Setting

More information

Important Notice. Safety Precautions. Limitation of Liability. R90 Series

Important Notice. Safety Precautions. Limitation of Liability. R90 Series Important Notice Due to the nature of wireless communications, transmission and reception of data can never be guaranteed. Data may be delayed, corrupted (i.e., have errors) or be totally lost. Although

More information

This chapter describes how to set up and manage VPN service in Mac OS X Server.

This chapter describes how to set up and manage VPN service in Mac OS X Server. 6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure

More information

Wireless Broadband Router. User Manual. Solutions for the Digital Life. Model #: MI424-WR. Firmware Version: 4.0.16.1.45.120. Ver 1.

Wireless Broadband Router. User Manual. Solutions for the Digital Life. Model #: MI424-WR. Firmware Version: 4.0.16.1.45.120. Ver 1. Wireless Broadband Router Model #: MI424-WR Firmware Version: 4.0.16.1.45.120 User Manual Ver 1.1 Solutions for the Digital Life Table of Contents 1 Introduction 1 Package Contents 1 Minimum System Requirements

More information

Computer Networks. Secure Systems

Computer Networks. Secure Systems Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to

More information

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for

More information

Wireless Cable Gateway CG3300CMR

Wireless Cable Gateway CG3300CMR Wireless Cable Gateway CG3300CMR User Manual 350 East Plumeria Drive San Jose, CA 95134 USA September 2012 202-11068-02 v1.0 2012 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,

More information

Wireless Broadband Router

Wireless Broadband Router Wireless Broadband Router Model #: MI424WR Firmware Version: 4.0.16.1.44.28 User Manual Ver 2.0 Solutions for the Digital Life Table of Contents 1 Introduction 1 Package Contents 1 Minimum System Requirements

More information

Network Security Best Practices

Network Security Best Practices CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual

More information

Wireless Access Point 300 802.11n Wireless with 4 Port 10/100 Switch

Wireless Access Point 300 802.11n Wireless with 4 Port 10/100 Switch 300 802.11n Wireless with 4 Port 10/100 Switch User Manual www.hamletcom.com INDEX 1. Introduction...6 1.1 System Requirements... 6 1.2 Package Contents... 6 2. Specification...7 2.1 LED Meaning... 7 2.2

More information

WIRELESS NETWORKING SECURITY

WIRELESS NETWORKING SECURITY WIRELESS NETWORKING SECURITY Dec 2010 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

BROADBAND INTERNET ROUTER USER S MANUAL. Version 1.0. - Page 1 of 13 -

BROADBAND INTERNET ROUTER USER S MANUAL. Version 1.0. - Page 1 of 13 - Version 1.0 - Page 1 of 13 - 10/100M Broadband Router GETTING TO KNOW 2 3 4 1 5 7 6 - Page 2 of 13 - LED Indicator S/N Indicator Function 1 Power LED (Green) LED lights up steadily indicate that the power

More information

Wireless-G. User Guide. GHz 2.4 802.11g. A Division of Cisco Systems, Inc. WIRELESS. Model No.WRT54GP2

Wireless-G. User Guide. GHz 2.4 802.11g. A Division of Cisco Systems, Inc. WIRELESS. Model No.WRT54GP2 Your Internet Telephone Company offering you more - connecting you for less A Division of Cisco Systems, Inc. GHz 2.4 802.11g Wireless-G WIRELESS User Guide Model No.WRT54GP2 Copyright and Trademarks Specifications

More information

ESR-9753 802.11b/g/n SOHO Router

ESR-9753 802.11b/g/n SOHO Router ESR-9753 is a 1T1R Wireless Single chip 11N Broadband Router that delivers up to 3x faster speeds than 802.11g devices. ESR-9753 supports home network with superior throughput and performance and unparalleled

More information

User Manual Gateway U270V

User Manual Gateway U270V User Manual Gateway U270V Important Notice Due to the nature of wireless communications, transmission and reception of data can never be guaranteed. Data may be delayed, corrupted (i.e., have errors) or

More information

Wireless-G. GHz 2.4 802.11g. Broadband Router with 2 Phone Ports. Installation and Troubleshooting Guide WRT54GP2. VoIP

Wireless-G. GHz 2.4 802.11g. Broadband Router with 2 Phone Ports. Installation and Troubleshooting Guide WRT54GP2. VoIP A Division of Cisco Systems, Inc. GHz 2.4 802.11g VoIP Wireless-G Broadband Router with 2 Phone Ports Installation and Troubleshooting Guide Model No. WRT54GP2 Copyright and Trademarks Specifications are

More information

Design and Implementation Guide. Apple iphone Compatibility

Design and Implementation Guide. Apple iphone Compatibility Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new

More information

PePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400

PePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400 PePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400 PePWave Surf Outdoor Series: Surf AP 200/400-X, PolePoint 400-X, Surf 400-DX User Manual Document Rev. 1.2 July 07 COPYRIGHT & TRADEMARKS

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information