Module 6, Assignment 5

Size: px
Start display at page:

Download "Module 6, Assignment 5"

Transcription

1 SusanFerdon,EDTECH552SP11 Module 6, Assignment Multiple Choice Questions 1. Which of the following is unlicensed band, which can be used by WLAN s? A. 2.4 GHz band B. 2.4 MHz band C. 5 GHz band D. 5 MHz band E. 900 GHz band F. 900 MHz band 2. Which standard has the highest possible data rates? A B a C b D g E n 3. Which standard provides the strongest level of WLAN security? A. EAP B. WEP C. WPA D i/WPA2 4. Which regulatory agency contols the standard that governs WLANs? A. Wi-Fi Alliance B. IEEE C. EMA D. WISC 5. When you are using x, how is the client authenticated? Q: 258, A: 472, in text: 244 A. The clent is authenticated against a local database stored on the access point B. The access point forwards all network traffic to the the server where it is either authenticated or blocked C. The access point encapsulates any 802.1x traffic bound for the anthentication server and sends it to the server D. The client encapsulates the 802.1x authrntication traffic before sending it to the access point. This causes the access point to forward it to the server

2 SusanFerdon,EDTECH552SP Configuring Wireless Network Objectives Createasecurityplanforahomeorsmallbusinessnetwork. Configurethewirelessaccesspoint(AP)portionofamulti functiondeviceusingsecuritybest practices. 5.3 Set up a Wireless Environment in Packet Tracer Step1. Step2. Step3. Step4. Step5. Step6. Openpackettracer ChooseWirelessDevicesthenchooseLinksysWRT300N Dragwirelessrouterontoworkarea,chooseenddevices,thenchoosegenericPC DragPContoworkareaanddoubleclickonPC Switchoffpower.DragoffNIC(Justdragitoutsidethecomputer)thenreplacewith Linksys WMP300N(ReplaceNICwithwirelessNIC) TheNIChasbeenreplacedtowirelessNIC switchonthecomputer Step7. Clickondesktoptab YoucansetyourIPconfigurationhere Youcanruncommandprompt(suchasping,tracert, )here. Youcanopenawebbrowsertosetupwirelessroutersettings.Pleasereadtask2 instructionfordetails. Atthispoint,Ifollowedtheprocedureintheforumposttogettherouterconnectedagain. 5.4 Connect a Computer to the Wireless Router Log in to the Administration Interface. Step1. Step2. Connectyourcomputer(EthernetNIC)tothemulti functiondevice(port1ofthelinksys WRT300N)byusingastraight throughcable. (Inmostcases,youcanskipthisstepbecausethewirelessrouterwillassignan XXXIPtoeachofconnecteddevices). ThedefaultIPaddressoftheLinksysWRT300Nis ,andthedefaultsubnet maskis thecomputerandlinksysdevicemustbeonthesamenetworkto

3 SusanFerdon,EDTECH552SP11 communicatewitheachother.changetheipaddressofthecomputerto , andverifythatthesubnetmaskis entertheinternaladdressofthe Linksysdevice( )asthedefaultgateway.DothisbyclickingStart>Control Panel>NetworkConnections.Right clickthewirelessconnectionandchooseproperties. SelecttheInternetProtocol(TCP/IP)andentertheaddresses,asshownbelow. Step3. Step4. Openawebbrowser,suchasInternetExplorer,Netscape,orFirefoxandentertheIP addressofthelinksysdevice( ifresettodefaults)intotheaddressfieldand pressenter.ascreenappears,requestingyourusernameandpassword. EnteradminfortheUsernameandenteradminforthepassword.Itisthedefault passwordonthelinksysdevice.clickok.rememberthatpasswordsarecasesensitive. NOTE:AsyoumakethenecessarychangesontheLinksysdevice,clickSaveSettingson eachscreentosavethechangesorclickcancelchangestokeepthedefaultsettings 5.5 Change the Linksys Device Password Step1. ClicktheAdministrationtab.TheManagementtabisselectedbydefault. Step2. Step3. EnteranewpasswordfortheLinksysdevice,andthenconfirmthepassword.Thenew passwordmustnotbemorethan32charactersandmustnotincludeanyspaces.the passwordisrequiredtoaccessthelinksysdeviceweb basedutilityandsetupwizard.be suretorecordthepasswordyouused. NewRouterPassword:EdTech552 TheWebUtilityAccessviaWirelessoptionisenabledbydefault,asshownbelow.This optionshouldbedisabledorconfiguredonlytoacceptconnectionsthroughsecure protocolsifsecurityisofconcern. Step4. ClicktheSaveSettingsbuttontosavetheinformation. 5.6 Configure the Wireless Security Settings Step1. ClicktheWirelesstab,asshownbelow.TheBasicWirelessSettingstabisselectedby default.thenetworknameisthessidsharedamongalldevicesonyournetwork.it mustbeidenticalforalldevicesinthewirelessnetwork.itiscasesensitiveandmustnot bemorethan32characters. Step2. Verify the SSID in use. If the SSID is set to the default value of linksys, change it to a

4 SusanFerdon,EDTECH552SP11 uniquename.recordthenameyouhavechosen:lab5 Step3. Step4. LeavetheRadioBandsettoAuto.Thissettingallowsyournetworktouseall802.11n,g, andbdevices. For SSID Broadcast, click the Disabled button to disable the SSID broadcast. Wireless clientssurveytheareafornetworkstoassociatewithandwilldetectthessidbroadcast sent by the Linksys device. For added security, do not broadcast the SSID. Please note thatthereareutilitiesandtechniquestodiscoverthessidevenifitisnotbroadcast.this shouldbeusedinconjunctionwithothersecuritymeasures. Step5. Saveyoursettingsbeforegoingtothenexttask. Atthispoint,IgottheRequestTimeoutmessageagain.Itriedprocessfromforumpost againbut Lab5 didn tshowup nothingshowedupwhenitlookedfordevicesandthe wirelessconnectionwasgonebetweenthepcandtherouter.iquitandre-openedpacket tracerfile.whenitopened,theinfothatwaspreviouslyenteredwasstillthereandthe diagramshowsastraight-throughcableconnectionfromtheroutertothepc.iclickedonthe routerthen GUI tabandwasabletocontinuefromwhereileftoff 5.7 Configure Encryption and Authentication Step1. Step2. Step3. Step4. ClicktheWirelessSecuritytabontheWirelessscreen. SelectWPAPersonalintheSecurityModedrop downmenu,asshownbelow. On the next screen, choose an encryption algorithm. To secure a network, use the highest level of encryption possible within the Selected Security mode. The following securitymodesandencryptionlevelsarelistedfromleastsecure(wep)tomostsecure (WPA2withAES): WEP WPA,includingTemporalKeyIntegrityProtocol(TKIP)andAdvancedEncryption System(AES) WPA2,includingTKIPandAES AES is supported only by newer devices that contain a co processor. To ensure compatibilitywithalldevices,selecttkip. For authentication, enter a pre shared key between 8 and 63 characters. This key is sharedbythelinksysdeviceandallconnecteddevices.recordthepre sharedkeythat

5 SusanFerdon,EDTECH552SP11 youused:sharedkey Step5. Step6. Chooseakeyrenewalperiodbetween600and7200seconds.Therenewalperiodishow oftenthelinksysdevicechangestheencryptionkey.theshorterthekeyrenewalperiod the more secure the connection. Unfortunately, shorter key renewal periods also increasethenetworkoverhead. Saveyoursettingsbeforeexitingthescreen. 5.8 Configure MAC Address Filtering Step1. ClicktheWirelessMACFiltertabontheWirelessscreen. Step2. MACaddressfilteringallowsonlyselectedwirelessclientMACaddressestohaveaccess toyournetwork.selectthepermitpcslistedbelowtoaccessthewirelessnetworkradio button. Click the Wireless Client List button to display a list of all wireless client computersonyournetwork. Step3. The next screen allows you to identify which MAC addresses can have access to the wireless network. Check the Save to MAC Address Filter List check box for any client deviceyouwanttoadd,andthenclicktheadd button.anywirelessclients,otherthan those in the list, will be prevented from accessing your wireless network. Save your settingsbeforeexitingthescreen. Igotasfarasthislaststepthenranintoanotherproblem thebuttonthatsays Wireless ClientList isnotclickablesonodevicesareshowinguptoadd.iwasnotabletocomplete Step3.

6 SusanFerdon,EDTECH552SP Reflection Q 5.9.1: List at least three security best practices that you should implement to secure your multi-function device and wireless network. Protecting my Wireless Network: Change password on router so it is not the default. WPA2 Most robust authentication and encryption is the default on my Mac. MAC Address Filtering There are 13 wireless networks within range of my living room and only two of them are mine. That means that my networks are probably within range of their living rooms as well. By enabling access for only my family s computers, our network will be more secure. Disable SSID broadcast so that other clients will not be able to easily find my wireless network. Firewall settings Adjust firewall settings for specific applications (Mac Security settings) and for anti-virus software. Authentication with 802.1X Client configurations can be exported as an Internet Connect file and distributed via , on a secure website, or using other out-of-band methods. When the user opens the file, all necessary settings are imported into Internet Connect, so the client is configured instantly for wireless communications (Source: MacOSX Security, page 7). Protecting my computer: In Bluetooth preferences, uncheck share my Internet connection with other Bluetooth devices. Turn off my laptop s Airport/NIC when I m not online if I can t access the network then attackers can t access me, right? Strong authentication Set up my computer, and other network devices, so that logins/passwords are required. FileVault with FileVault enabled, all documents are stored in encrypted form using AES. Documents are decrypted on the fly and reencrypted as they are saved. If possible, don t use shared open networks, like Starbucks or Borders. Definitely don t access personally identifiable information or password protected sites. Q 5.9.2: In these security settings, which feature that you configured on the Linksys WRT300N makes you feel the most secure and why? WPA2 encryption. It seems that attackers can find all kinds of ways to get into a network. For example, if an attacker is able to intercept a frame, the source and destination MAC addresses can be identified. They could then manually assign their device my MAC address and be able to get in, even with MAC Address filtering enabled. WPA2 encryption means that even if a frame is intercepted, it can t be read because the attacker doesn t have the encryption key. A shorter renewal period will mean a more secure network. Changing the

7 SusanFerdon,EDTECH552SP11 administrator password on the router will safeguard settings, but attackers still seem to find their way in. While building firewalls and other safeguards into the network topology, and adjusting security settings, all go a long way towards a safer environment, safeguarding the data itself (encryption process) makes me feel most secure since that data would be safe even if an attacker gets past all the other safeguards that are in place.

United States Trustee Program s Wireless LAN Security Checklist

United States Trustee Program s Wireless LAN Security Checklist United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

Configuring Routers and Their Settings

Configuring Routers and Their Settings Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because

More information

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2

More information

Configure WorkGroup Bridge on the WAP131 Access Point

Configure WorkGroup Bridge on the WAP131 Access Point Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless

More information

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis: IMPORTANT! This Guide refers to the following Products: Securing Your Wireless Network Please read the following carefully; Synopsis: This Guide is designed to help you if you have a Wireless Network that

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Wireless Network Configuration Guide

Wireless Network Configuration Guide CIT Table of Contents Introduction... 1 General Wireless Settings... 1 1. Windows XP Wireless Configuration... 2 2. Windows XP Intel Pro Wireless Tool... 7 3. Windows Vista Using the Windows Wireless Tools...

More information

Setting up a WiFi Network (WLAN)

Setting up a WiFi Network (WLAN) Setting up a WiFi Network (WLAN) How to set up Wi-Fi on your Huawei E960 InZone Step 1: In the address field on your internet browser, type http://192.168.1.1/ Step 2: Type admin into the Password box

More information

Securing your Linksys WRT54G

Securing your Linksys WRT54G Securing your Linksys WRT54G Abstract Current implementations of the 802.11b and 802.11g wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms in these

More information

Securing your Linksys Wireless Router BEFW11S4 Abstract

Securing your Linksys Wireless Router BEFW11S4 Abstract Securing your Linksys Wireless Router BEFW11S4 Abstract Current implementations of the 802.11b wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms

More information

Instructions for connecting to winthropsecure. Windows 7/8 Quick Connect Windows 7/8 Manual Wireless Set Up Apple Quick Connect Apple Settings Check

Instructions for connecting to winthropsecure. Windows 7/8 Quick Connect Windows 7/8 Manual Wireless Set Up Apple Quick Connect Apple Settings Check Instructions for connecting to winthropsecure Windows 7/8 Quick Connect Windows 7/8 Manual Wireless Set Up Apple Quick Connect Apple Settings Check Windows 7 Windows 8 Quick Connect 1. Select the Wi-Fi

More information

How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?

How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)? Is it really necessary for the three ports mentioned in Troubleshooting (UDP 88, UDP 3074, and TCP 3074) to be opened for Xbox Live to work properly? Most cable/dsl routers implement Network Address Translation

More information

CONNECTING THE RASPBERRY PI TO A NETWORK

CONNECTING THE RASPBERRY PI TO A NETWORK CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete

More information

Connecting to UNOSECURE using Windows 7

Connecting to UNOSECURE using Windows 7 Connecting to UNOSECURE using Windows 7 1. Click the Wireless status icon on the task bar. 2. Select the unosecure connection and click connect. 3. Enter your UNO username and password. Click OK. UCC Help

More information

User Guide for eduroam

User Guide for eduroam User Guide for eduroam 獲 以 下 認 證 : Certificado pela: Certified by: 澳 門 望 廈 山 Colina de Mong-Há, Macau 電 話 : (853) 8598 3120 Tel: (853) 8598 3120 傳 真 : (853) 8598 3151 Fax: (853) 8598 3151 www.ift.edu.mo

More information

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

Chapter 3 Safeguarding Your Network

Chapter 3 Safeguarding Your Network Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate

More information

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. 1. Click the Windows Start button, then Control Panel How-To-WCC-Secure-Windows-7-11/4/2010-4:09

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Contents Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Automatic Setup 1. Click on the Wireless icon in your system tray that looks like. 2. You will see a list of available

More information

Question How do I access the router s web-based setup page? Answer

Question How do I access the router s web-based setup page? Answer http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=3676 Question How do I access the router s web-based setup page? Answer All Linksys routers have a built-in web-based setup

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without

More information

How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall:

How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall: How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall: General Settings To connect to the ResNet-Secure SSID, a device is needed that supports 802.1X authentication and WPA2 Enterprise.

More information

Extension Wireless Access (EWA) v2.0

Extension Wireless Access (EWA) v2.0 Extension Wireless Access (EWA) v2.0 The Extension Wireless Network (EWA) is broken into two parts: the public network (vce pub) and the private network (vce wlan). The public network (vce pub) is secured

More information

How To Secure Wireless Networks

How To Secure Wireless Networks Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements

More information

WIRELESS SETUP FOR WINDOWS 7

WIRELESS SETUP FOR WINDOWS 7 Computing & Communications WIRELESS SETUP FOR WINDOWS 7 For assistance during the configuration process please call the Computing and Communications Help Desk at 639-2049, avdesk@swgc.mun.ca Who should

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Hackers can easily trap information transmitted over wireless network, it has to be encrypted to avoid unauthorized users

More information

Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network

Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network Wireless Network Names and Credentials There are two wireless networks operating at the Goldfields

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

Configuring Security Solutions

Configuring Security Solutions CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com

802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

Chapter 2 Wireless Settings and Security

Chapter 2 Wireless Settings and Security Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless

More information

Configuring Your Network s Security

Configuring Your Network s Security Configuring Your Network s Security Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible

More information

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students. Airnet-Student Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students. Airnet-Student has two key advantages over the current Airnet

More information

Security. TestOut Modules 12.6 12.10

Security. TestOut Modules 12.6 12.10 Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

Basic Wireless Configuration and Security

Basic Wireless Configuration and Security Basic Wireless Configuration and Security This quick start guide provides basic wireless configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For information about

More information

Windows 8 & RT Wireless Configuration For NCC Student Owned Laptops

Windows 8 & RT Wireless Configuration For NCC Student Owned Laptops Windows 8 & RT Wireless Configuration For NCC Student Owned Laptops A wireless network for Students to use with their personal laptops, is available throughout campus with the SSID NCC-STUDENT. This network

More information

Connecting to Secure Wireless (iitk-sec) on Fedora

Connecting to Secure Wireless (iitk-sec) on Fedora Connecting to Secure Wireless (iitk-sec) on Fedora Go to System Preferences Network Connections. Click on Wireless tab and then Add button. Check Connect automatically and Available to all users. Set SSID

More information

Linksys WAP300N. User Guide

Linksys WAP300N. User Guide User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating

More information

Dual-Band Wireless Network Extender. Model #: WCB3000N. User Manual. Ver 1.0

Dual-Band Wireless Network Extender. Model #: WCB3000N. User Manual. Ver 1.0 Dual-Band Wireless Network Extender Model #: WCB3000N User Manual Ver 1.0 Table of Contents Table of Contents 1 Introduction 3 Features 4 Getting to Know the WCB3000N 5 Front Panel 5 Back Panel 5 Accessing

More information

How To Set up and Configure the WNA-100 Wireless Network Adapter

How To Set up and Configure the WNA-100 Wireless Network Adapter How To Set up and Configure the WNA-100 Wireless Network Adapter Section 1: Set up and Connect the Adapter to a Computer, Then Configure the Computer to Communicate With the Adapter Before the adapter

More information

Quick Installation Guide

Quick Installation Guide V2.01 IP Wired / Wireless Camera Quick Installation Guide (For Windows OS) Model: FI8602/FI8602W ShenZhen Foscam Intelligent Technology Co., Ltd Packing List Quick Installation Guide 1) IP CAMERA X 1 2)

More information

Windows Vista and Windows 7 Wireless Configuration For NCC Faculty and Staff Owned Laptops

Windows Vista and Windows 7 Wireless Configuration For NCC Faculty and Staff Owned Laptops Windows Vista and Windows 7 Wireless Configuration For NCC Faculty and Staff Owned Laptops A wireless network for Faculty and Staff to use with their personal laptops, is available throughout campus with

More information

TECH BULLETIN NETGEN1 DOOR CONTROLLER WI-FI NETWORK CONFIG

TECH BULLETIN NETGEN1 DOOR CONTROLLER WI-FI NETWORK CONFIG TECH BULLETIN NETGEN1 DOOR CONTROLLER WI-FI NETWORK CONFIG February 12, 2008 The factory default network configuration for BlueWave Security s Wi-Fi NetGen1 door controllers is a dynamic DHCP IP address,

More information

University of Hawaii at Manoa Professor: Kazuo Sugihara

University of Hawaii at Manoa Professor: Kazuo Sugihara University of Hawaii at Manoa Professor: Kazuo Sugihara Assignment 2 (ICS426) Network Setup Tutorials By: Yu Fong Okoji (yokoji@hawaii.edu) 10/27/2009 Tutorial on Home Network Setup INTRODUCTION In this

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with RangeBooster User Guide Model No. WMP54GR Copyright and Trademarks Specifications are subject to change without notice.

More information

CS 356 Lecture 29 Wireless Security. Spring 2013

CS 356 Lecture 29 Wireless Security. Spring 2013 CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

Using LAN Wi-Fi (WLAN) 3-2 Connecting Wi-Fi Devices via Wi-Fi (WLAN) 3-3 Connecting Windows 3-5 Connecting Mac 3-8

Using LAN Wi-Fi (WLAN) 3-2 Connecting Wi-Fi Devices via Wi-Fi (WLAN) 3-3 Connecting Windows 3-5 Connecting Mac 3-8 Wi-Fi (WLAN) -2 Connecting Wi-Fi Devices via Wi-Fi (WLAN) - Connecting WPS Supported Wi-Fi Devices - Connecting Game Consoles - Connecting Android Devices -4 Connecting Windows -5 Windows 7-5 Windows Vista

More information

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7 Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7 Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements

More information

User Guide. E-Series Routers

User Guide. E-Series Routers User Guide E-Series Routers Table of Contents Table of Contents Product overview E900/E1200/E1500/E2500/E3200 1 Back view 1 Bottom view 1 E4200 2 Top view 2 Back view 2 Setting Up Your E-Series Router

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

Securing Your Wireless Network

Securing Your Wireless Network Choosing A Wireless Router You might already have a wireless router provided to you by your Internet Service Provider. Otherwise, if you are intending to get one or decide to upgrade your old router, look

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter. User Guide WIRELESS WMP54G. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter. User Guide WIRELESS WMP54G. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter User Guide Model No. WMP54G Copyright and Trademarks Specifications are subject to change without notice. Linksys is a

More information

Last Updated: January 23, 2013 1. FLCCsecure

Last Updated: January 23, 2013 1. FLCCsecure Last Updated: January 23, 2013 1 FLCCsecure How to Set Up a Secure Wireless Device for Students and Employees Please Note: This packet is a general overview of how to setup the most commonly used personal

More information

How To. Simply Connected. XWR-1750 Basic Configuration INTRODUCTION

How To. Simply Connected. XWR-1750 Basic Configuration INTRODUCTION XWR-1750 Basic Configuration How To DOCUMENT INTRODUCTION This document will guide you through the initial setup of the XWR-1750 for basic functionality. What should I do? We recommend, you change your

More information

Network Services One Washington Square, San Jose, CA 95192-0209 408-924-1530

Network Services One Washington Square, San Jose, CA 95192-0209 408-924-1530 SJSU Premier Wi-Fi Service Network Services One Washington Square, San Jose, CA 95192-0209 408-924-1530 The SJSU Premier Wi-Fi service transmits your data across a secure, encrypted connection. This ensures

More information

How to configure your Thomson SpeedTouch 780WL for ADSL2+

How to configure your Thomson SpeedTouch 780WL for ADSL2+ How to configure your Thomson SpeedTouch 780WL for ADSL2+ Connecting up your router This guide assumes that you have successfully: unpacked your router connected it up to your phone socket using the DSL

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

Connecting to Wireless in Windows Vista

Connecting to Wireless in Windows Vista Connecting to Wireless in Windows Vista Reference: http://www.microsoft.com/technet/community/columns/cableguy/cg0406.mspx http://www.microsoft.com/technet/network/evaluate/hiddennet.mspx http://www.csd.toshiba.com/cgibin/tais/su/su_sc_dtlview.jsp?soid=1524510&moid=null&bv_sessionid=@@@@0175

More information

TECHNICAL NOTE REFERENCE DOCUMENT. Improving Security for Axis Products. Created: 4 October 2007. Last updated: 11 October 2007. Rev: 1.

TECHNICAL NOTE REFERENCE DOCUMENT. Improving Security for Axis Products. Created: 4 October 2007. Last updated: 11 October 2007. Rev: 1. TECHNICAL NOTE REFERENCE DOCUMENT Improving Security for Axis Products Created: 4 October 2007 Last updated: 11 October 2007 Rev: 1.0 TABLE OF CONTENTS 1 INTRODUCTION 3 2 BEST-PRACTICE SECURITY POLICIES

More information

How do I configure the wireless printer using Wi-Fi Protected Setup or AOSS and install the printer driver in Windows?

How do I configure the wireless printer using Wi-Fi Protected Setup or AOSS and install the printer driver in Windows? How do I configure the wireless printer using Wi-Fi Protected Setup or AOSS and install the printer driver in Windows? 1. Confirm your WLAN access point/router has the Wi-Fi Protected Setup or AOSS symbol

More information

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 CONFIGURING YOUR HOME WIRELESS NETWORK Presented by: Mr. Eric Fan, Chairman, PISA Knowledge 123 Firmware 軟 韌 體 Knowledge 123 Home Network Functions

More information

Windows Vista: Connecting to the fastnsecure@hood wireless network at Hood College

Windows Vista: Connecting to the fastnsecure@hood wireless network at Hood College Windows Vista: Connecting to the fastnsecure@hood wireless network at Hood College Please ensure your computer meets the following criteria in order to successfully make a connection to this network: 802.11n

More information

YO-301AP POE AP Datasheet

YO-301AP POE AP Datasheet YO-301AP POE AP Datasheet 300Mbps Wi-Fi Ceiling POE Access Point VER:1.0 Date:2013-06-03 1 Product Description: Practical and powerful The Ceiling PoE wireless access point for your home or office network

More information

Seamless and Secure Access (SSA) Manual Configuration Guide for Windows 7

Seamless and Secure Access (SSA) Manual Configuration Guide for Windows 7 Seamless and Secure Access (SSA) Manual Configuration Guide for Windows 7 Page 1 1 Enable Wi-Fi a) Please refer to your computer s user manual to enable the Wireless (Wi-Fi) connection. b) Please click

More information

Mac OS X Secure Wireless Setup Guide

Mac OS X Secure Wireless Setup Guide Mac OS X Secure Wireless Setup Guide Requirements: Apple computer with built-in AirPort card capable of WPA2-Enterprise encryption Mac OS X Snow Leopard version 10.6.0 or greater or Mac OS X Lion version

More information

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at

More information

LW310V2 Sweex Wireless 300N Router

LW310V2 Sweex Wireless 300N Router LW310V2 Sweex Wireless 300N Router Please notice! On the included CD-ROM you will find the Setup Wizard. This easy install procedure will show you how to setup the router step-by-step. Do not expose the

More information

SMC7901WBRA2-B1 Installation Guide

SMC7901WBRA2-B1 Installation Guide SMC7901WBRA2-B1 Installation Guide Model number: SMC7901WBR2- B1 Topic: Wireless Encryption (WPA) c. Click WLAN Security. Choose WPA2 Mixed under Encryption. Enter a password in the Pre- Shared Key and

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

Quick Installation Guide For Mac users

Quick Installation Guide For Mac users Quick Installation Guide For Mac users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include

More information

Wireless Encryption Protection

Wireless Encryption Protection Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost

More information

USER GUIDE AC2400. DUAL BAND GIGABIT Wi Fi ROUTER. Model# E8350

USER GUIDE AC2400. DUAL BAND GIGABIT Wi Fi ROUTER. Model# E8350 USER GUIDE AC2400 DUAL BAND GIGABIT Wi Fi ROUTER Model# E8350 Table of Contents Product overview E8350..................................... 1 Setting Up Your E-Series Router Where to find more help.........................

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

How To Secure A Wireless Network With A Wireless Device (Mb8000)

How To Secure A Wireless Network With A Wireless Device (Mb8000) MB8000 Network Security and Access Control Overview MB8000 employs almost all of the current popular WLAN security mechanisms. These include wireless-user isolation, closed system (by turning off SSID

More information

NETWORK USER S GUIDE. Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server

NETWORK USER S GUIDE. Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server NETWORK USER S GUIDE This Network User's Guide provides useful information of wired and wireless

More information

Beef O Brady's. Security Review. Powered by

Beef O Brady's. Security Review. Powered by Beef O Brady's Security Review Powered by Why install a Business Class Firewall? Allows proper segmentation of Trusted and Untrusted computer networks (PCI Requirement) Restrict inbound and outbound traffic

More information

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture State of Kansas Interim Wireless Local Area Networks Security and Technical Architecture October 6, 2005 Prepared for Wireless Policy Committee Prepared by Revision Log DATE Version Change Description

More information

Recommended 802.11 Wireless Local Area Network Architecture

Recommended 802.11 Wireless Local Area Network Architecture NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE 12/11/2012 Index 1 INTRODUCTION... 1-1 2 FACTORY DEFAULT SETTINGS... 2-1 3 CPE BASIC OPERATIONS... 3-1 3.1 PASSWORD MODIFICATION...

More information

WiFi Security Assessments

WiFi Security Assessments WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents

More information

Particularities of security design for wireless networks in small and medium business (SMB)

Particularities of security design for wireless networks in small and medium business (SMB) Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, tomai@econ.ubbcluj.ro

More information

Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University

Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University Potential Security Vulnerabilities of a Wireless Network Implementation in a Military Healthcare Environment Jason Meyer East Carolina University Abstract This paper will look into the regulations governing

More information

Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page

Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page Contents Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page.. 2 Checking the Linksys router s wireless settings through the web-based setup page and adding

More information

Wireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No.

Wireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No. 2,4 GHz WIRELESS Wireless-N PCI Adapter User Guide Model No. WMP300N (EU) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of

More information

Massey University Wireless Network - Client

Massey University Wireless Network - Client Massey University Wireless Network - Client Configuration Windows Mobile 5/6 Windows Mobile wireless network Requirements Information Technology Services You must have an active Massey network account,

More information

USER GUIDE AC2600 MU-MIMO GIGABIT ROUTER. Model# EA8500

USER GUIDE AC2600 MU-MIMO GIGABIT ROUTER. Model# EA8500 USER GUIDE AC2600 MU-MIMO GIGABIT ROUTER Model# EA8500 Table of Contents Product overview EA8500.....................................1 Setting Up Your Router Where to find more help.........................

More information

Edith Cowan University Information Technology Services Centre

Edith Cowan University Information Technology Services Centre Information There are three wireless networks on campus which give you access to the ECU website, the staff intranet, the internet and other ECU resources: ECU This is the easiest to use and safest wireless

More information

FAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering?

FAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering? FAQs: MATRIX NAVAN CNX200 Q: How to configure port triggering? Port triggering is a type of port forwarding where outbound traffic on predetermined ports sends inbound traffic to specific incoming ports.

More information

running operation mode painless TECHNICAL SPECIFICATION WAN/LAN: One 10/100 Fast Ethernet RJ-45 WPS (WiFi Protected Setup) WAN (Internet connection)

running operation mode painless TECHNICAL SPECIFICATION WAN/LAN: One 10/100 Fast Ethernet RJ-45 WPS (WiFi Protected Setup) WAN (Internet connection) PRODUCT DESCRIPTION ETR9350 is a 2T2R Wireless Single chip 11N Travel AP/Router that delivers up to 6x faster speeds than 802.11g devices. ETR9350 drives superior performance and unparalleled wireless

More information

Wireless Network Best Practices for General User

Wireless Network Best Practices for General User Wireless Network Best Practices for General User I n Hong Kong, the number of Wi-Fi access points (hotspots) has reached 31,000 in 2015 1. Unfortunately, not all of them are well-protected. In fact, wireless

More information

Quick Installation Guide-For MAC users

Quick Installation Guide-For MAC users Quick Installation Guide-For MAC users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include

More information

ICT DEPARTMENT. Windows 7. Wireless Authentication Procedures for Windows 7 & 8 Users For Linux and windows XP users visit ICT office

ICT DEPARTMENT. Windows 7. Wireless Authentication Procedures for Windows 7 & 8 Users For Linux and windows XP users visit ICT office ICT DEPARTMENT Wireless Authentication Procedures for Windows 7 & 8 Users For Linux and windows XP users visit ICT office Requirements: 1. Wireless enable laptop with Valid Anti-Virus 2. Configure your

More information