Module 6, Assignment 5
|
|
- Agnes Jackson
- 8 years ago
- Views:
Transcription
1 SusanFerdon,EDTECH552SP11 Module 6, Assignment Multiple Choice Questions 1. Which of the following is unlicensed band, which can be used by WLAN s? A. 2.4 GHz band B. 2.4 MHz band C. 5 GHz band D. 5 MHz band E. 900 GHz band F. 900 MHz band 2. Which standard has the highest possible data rates? A B a C b D g E n 3. Which standard provides the strongest level of WLAN security? A. EAP B. WEP C. WPA D i/WPA2 4. Which regulatory agency contols the standard that governs WLANs? A. Wi-Fi Alliance B. IEEE C. EMA D. WISC 5. When you are using x, how is the client authenticated? Q: 258, A: 472, in text: 244 A. The clent is authenticated against a local database stored on the access point B. The access point forwards all network traffic to the the server where it is either authenticated or blocked C. The access point encapsulates any 802.1x traffic bound for the anthentication server and sends it to the server D. The client encapsulates the 802.1x authrntication traffic before sending it to the access point. This causes the access point to forward it to the server
2 SusanFerdon,EDTECH552SP Configuring Wireless Network Objectives Createasecurityplanforahomeorsmallbusinessnetwork. Configurethewirelessaccesspoint(AP)portionofamulti functiondeviceusingsecuritybest practices. 5.3 Set up a Wireless Environment in Packet Tracer Step1. Step2. Step3. Step4. Step5. Step6. Openpackettracer ChooseWirelessDevicesthenchooseLinksysWRT300N Dragwirelessrouterontoworkarea,chooseenddevices,thenchoosegenericPC DragPContoworkareaanddoubleclickonPC Switchoffpower.DragoffNIC(Justdragitoutsidethecomputer)thenreplacewith Linksys WMP300N(ReplaceNICwithwirelessNIC) TheNIChasbeenreplacedtowirelessNIC switchonthecomputer Step7. Clickondesktoptab YoucansetyourIPconfigurationhere Youcanruncommandprompt(suchasping,tracert, )here. Youcanopenawebbrowsertosetupwirelessroutersettings.Pleasereadtask2 instructionfordetails. Atthispoint,Ifollowedtheprocedureintheforumposttogettherouterconnectedagain. 5.4 Connect a Computer to the Wireless Router Log in to the Administration Interface. Step1. Step2. Connectyourcomputer(EthernetNIC)tothemulti functiondevice(port1ofthelinksys WRT300N)byusingastraight throughcable. (Inmostcases,youcanskipthisstepbecausethewirelessrouterwillassignan XXXIPtoeachofconnecteddevices). ThedefaultIPaddressoftheLinksysWRT300Nis ,andthedefaultsubnet maskis thecomputerandlinksysdevicemustbeonthesamenetworkto
3 SusanFerdon,EDTECH552SP11 communicatewitheachother.changetheipaddressofthecomputerto , andverifythatthesubnetmaskis entertheinternaladdressofthe Linksysdevice( )asthedefaultgateway.DothisbyclickingStart>Control Panel>NetworkConnections.Right clickthewirelessconnectionandchooseproperties. SelecttheInternetProtocol(TCP/IP)andentertheaddresses,asshownbelow. Step3. Step4. Openawebbrowser,suchasInternetExplorer,Netscape,orFirefoxandentertheIP addressofthelinksysdevice( ifresettodefaults)intotheaddressfieldand pressenter.ascreenappears,requestingyourusernameandpassword. EnteradminfortheUsernameandenteradminforthepassword.Itisthedefault passwordonthelinksysdevice.clickok.rememberthatpasswordsarecasesensitive. NOTE:AsyoumakethenecessarychangesontheLinksysdevice,clickSaveSettingson eachscreentosavethechangesorclickcancelchangestokeepthedefaultsettings 5.5 Change the Linksys Device Password Step1. ClicktheAdministrationtab.TheManagementtabisselectedbydefault. Step2. Step3. EnteranewpasswordfortheLinksysdevice,andthenconfirmthepassword.Thenew passwordmustnotbemorethan32charactersandmustnotincludeanyspaces.the passwordisrequiredtoaccessthelinksysdeviceweb basedutilityandsetupwizard.be suretorecordthepasswordyouused. NewRouterPassword:EdTech552 TheWebUtilityAccessviaWirelessoptionisenabledbydefault,asshownbelow.This optionshouldbedisabledorconfiguredonlytoacceptconnectionsthroughsecure protocolsifsecurityisofconcern. Step4. ClicktheSaveSettingsbuttontosavetheinformation. 5.6 Configure the Wireless Security Settings Step1. ClicktheWirelesstab,asshownbelow.TheBasicWirelessSettingstabisselectedby default.thenetworknameisthessidsharedamongalldevicesonyournetwork.it mustbeidenticalforalldevicesinthewirelessnetwork.itiscasesensitiveandmustnot bemorethan32characters. Step2. Verify the SSID in use. If the SSID is set to the default value of linksys, change it to a
4 SusanFerdon,EDTECH552SP11 uniquename.recordthenameyouhavechosen:lab5 Step3. Step4. LeavetheRadioBandsettoAuto.Thissettingallowsyournetworktouseall802.11n,g, andbdevices. For SSID Broadcast, click the Disabled button to disable the SSID broadcast. Wireless clientssurveytheareafornetworkstoassociatewithandwilldetectthessidbroadcast sent by the Linksys device. For added security, do not broadcast the SSID. Please note thatthereareutilitiesandtechniquestodiscoverthessidevenifitisnotbroadcast.this shouldbeusedinconjunctionwithothersecuritymeasures. Step5. Saveyoursettingsbeforegoingtothenexttask. Atthispoint,IgottheRequestTimeoutmessageagain.Itriedprocessfromforumpost againbut Lab5 didn tshowup nothingshowedupwhenitlookedfordevicesandthe wirelessconnectionwasgonebetweenthepcandtherouter.iquitandre-openedpacket tracerfile.whenitopened,theinfothatwaspreviouslyenteredwasstillthereandthe diagramshowsastraight-throughcableconnectionfromtheroutertothepc.iclickedonthe routerthen GUI tabandwasabletocontinuefromwhereileftoff 5.7 Configure Encryption and Authentication Step1. Step2. Step3. Step4. ClicktheWirelessSecuritytabontheWirelessscreen. SelectWPAPersonalintheSecurityModedrop downmenu,asshownbelow. On the next screen, choose an encryption algorithm. To secure a network, use the highest level of encryption possible within the Selected Security mode. The following securitymodesandencryptionlevelsarelistedfromleastsecure(wep)tomostsecure (WPA2withAES): WEP WPA,includingTemporalKeyIntegrityProtocol(TKIP)andAdvancedEncryption System(AES) WPA2,includingTKIPandAES AES is supported only by newer devices that contain a co processor. To ensure compatibilitywithalldevices,selecttkip. For authentication, enter a pre shared key between 8 and 63 characters. This key is sharedbythelinksysdeviceandallconnecteddevices.recordthepre sharedkeythat
5 SusanFerdon,EDTECH552SP11 youused:sharedkey Step5. Step6. Chooseakeyrenewalperiodbetween600and7200seconds.Therenewalperiodishow oftenthelinksysdevicechangestheencryptionkey.theshorterthekeyrenewalperiod the more secure the connection. Unfortunately, shorter key renewal periods also increasethenetworkoverhead. Saveyoursettingsbeforeexitingthescreen. 5.8 Configure MAC Address Filtering Step1. ClicktheWirelessMACFiltertabontheWirelessscreen. Step2. MACaddressfilteringallowsonlyselectedwirelessclientMACaddressestohaveaccess toyournetwork.selectthepermitpcslistedbelowtoaccessthewirelessnetworkradio button. Click the Wireless Client List button to display a list of all wireless client computersonyournetwork. Step3. The next screen allows you to identify which MAC addresses can have access to the wireless network. Check the Save to MAC Address Filter List check box for any client deviceyouwanttoadd,andthenclicktheadd button.anywirelessclients,otherthan those in the list, will be prevented from accessing your wireless network. Save your settingsbeforeexitingthescreen. Igotasfarasthislaststepthenranintoanotherproblem thebuttonthatsays Wireless ClientList isnotclickablesonodevicesareshowinguptoadd.iwasnotabletocomplete Step3.
6 SusanFerdon,EDTECH552SP Reflection Q 5.9.1: List at least three security best practices that you should implement to secure your multi-function device and wireless network. Protecting my Wireless Network: Change password on router so it is not the default. WPA2 Most robust authentication and encryption is the default on my Mac. MAC Address Filtering There are 13 wireless networks within range of my living room and only two of them are mine. That means that my networks are probably within range of their living rooms as well. By enabling access for only my family s computers, our network will be more secure. Disable SSID broadcast so that other clients will not be able to easily find my wireless network. Firewall settings Adjust firewall settings for specific applications (Mac Security settings) and for anti-virus software. Authentication with 802.1X Client configurations can be exported as an Internet Connect file and distributed via , on a secure website, or using other out-of-band methods. When the user opens the file, all necessary settings are imported into Internet Connect, so the client is configured instantly for wireless communications (Source: MacOSX Security, page 7). Protecting my computer: In Bluetooth preferences, uncheck share my Internet connection with other Bluetooth devices. Turn off my laptop s Airport/NIC when I m not online if I can t access the network then attackers can t access me, right? Strong authentication Set up my computer, and other network devices, so that logins/passwords are required. FileVault with FileVault enabled, all documents are stored in encrypted form using AES. Documents are decrypted on the fly and reencrypted as they are saved. If possible, don t use shared open networks, like Starbucks or Borders. Definitely don t access personally identifiable information or password protected sites. Q 5.9.2: In these security settings, which feature that you configured on the Linksys WRT300N makes you feel the most secure and why? WPA2 encryption. It seems that attackers can find all kinds of ways to get into a network. For example, if an attacker is able to intercept a frame, the source and destination MAC addresses can be identified. They could then manually assign their device my MAC address and be able to get in, even with MAC Address filtering enabled. WPA2 encryption means that even if a frame is intercepted, it can t be read because the attacker doesn t have the encryption key. A shorter renewal period will mean a more secure network. Changing the
7 SusanFerdon,EDTECH552SP11 administrator password on the router will safeguard settings, but attackers still seem to find their way in. While building firewalls and other safeguards into the network topology, and adjusting security settings, all go a long way towards a safer environment, safeguarding the data itself (encryption process) makes me feel most secure since that data would be safe even if an attacker gets past all the other safeguards that are in place.
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
More informationDeveloping Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
More informationConfiguring Routers and Their Settings
Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because
More informationTable of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
More informationConfigure WorkGroup Bridge on the WAP131 Access Point
Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless
More informationSelf Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:
IMPORTANT! This Guide refers to the following Products: Securing Your Wireless Network Please read the following carefully; Synopsis: This Guide is designed to help you if you have a Wireless Network that
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationWireless Network Configuration Guide
CIT Table of Contents Introduction... 1 General Wireless Settings... 1 1. Windows XP Wireless Configuration... 2 2. Windows XP Intel Pro Wireless Tool... 7 3. Windows Vista Using the Windows Wireless Tools...
More informationSetting up a WiFi Network (WLAN)
Setting up a WiFi Network (WLAN) How to set up Wi-Fi on your Huawei E960 InZone Step 1: In the address field on your internet browser, type http://192.168.1.1/ Step 2: Type admin into the Password box
More informationSecuring your Linksys WRT54G
Securing your Linksys WRT54G Abstract Current implementations of the 802.11b and 802.11g wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms in these
More informationSecuring your Linksys Wireless Router BEFW11S4 Abstract
Securing your Linksys Wireless Router BEFW11S4 Abstract Current implementations of the 802.11b wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms
More informationInstructions for connecting to winthropsecure. Windows 7/8 Quick Connect Windows 7/8 Manual Wireless Set Up Apple Quick Connect Apple Settings Check
Instructions for connecting to winthropsecure Windows 7/8 Quick Connect Windows 7/8 Manual Wireless Set Up Apple Quick Connect Apple Settings Check Windows 7 Windows 8 Quick Connect 1. Select the Wi-Fi
More informationHow To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?
Is it really necessary for the three ports mentioned in Troubleshooting (UDP 88, UDP 3074, and TCP 3074) to be opened for Xbox Live to work properly? Most cable/dsl routers implement Network Address Translation
More informationCONNECTING THE RASPBERRY PI TO A NETWORK
CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete
More informationConnecting to UNOSECURE using Windows 7
Connecting to UNOSECURE using Windows 7 1. Click the Wireless status icon on the task bar. 2. Select the unosecure connection and click connect. 3. Enter your UNO username and password. Click OK. UCC Help
More informationUser Guide for eduroam
User Guide for eduroam 獲 以 下 認 證 : Certificado pela: Certified by: 澳 門 望 廈 山 Colina de Mong-Há, Macau 電 話 : (853) 8598 3120 Tel: (853) 8598 3120 傳 真 : (853) 8598 3151 Fax: (853) 8598 3151 www.ift.edu.mo
More information9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
More informationChapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
More informationUse the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.
Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. 1. Click the Windows Start button, then Control Panel How-To-WCC-Secure-Windows-7-11/4/2010-4:09
More informationThe next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
More informationAutomatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18
Contents Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Automatic Setup 1. Click on the Wireless icon in your system tray that looks like. 2. You will see a list of available
More informationQuestion How do I access the router s web-based setup page? Answer
http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=3676 Question How do I access the router s web-based setup page? Answer All Linksys routers have a built-in web-based setup
More informationA Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
More informationHow to connect to NAU s WPA2 Enterprise implementation in a Residence Hall:
How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall: General Settings To connect to the ResNet-Secure SSID, a device is needed that supports 802.1X authentication and WPA2 Enterprise.
More informationExtension Wireless Access (EWA) v2.0
Extension Wireless Access (EWA) v2.0 The Extension Wireless Network (EWA) is broken into two parts: the public network (vce pub) and the private network (vce wlan). The public network (vce pub) is secured
More informationHow To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
More informationWIRELESS SETUP FOR WINDOWS 7
Computing & Communications WIRELESS SETUP FOR WINDOWS 7 For assistance during the configuration process please call the Computing and Communications Help Desk at 639-2049, avdesk@swgc.mun.ca Who should
More informationChapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
More informationConfiguring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)
Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Hackers can easily trap information transmitted over wireless network, it has to be encrypted to avoid unauthorized users
More informationInstallation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network
Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network Wireless Network Names and Credentials There are two wireless networks operating at the Goldfields
More informationSecurity Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
More informationConfiguring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
More informationA Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys
More information802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi Giulio.Rossetti@gmail.com
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi Giulio.Rossetti@gmail.com 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
More informationWireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
More informationChapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
More informationConfiguring Your Network s Security
Configuring Your Network s Security Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible
More informationAirnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.
Airnet-Student Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students. Airnet-Student has two key advantages over the current Airnet
More informationSecurity. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
More informationMN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
More informationBasic Wireless Configuration and Security
Basic Wireless Configuration and Security This quick start guide provides basic wireless configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For information about
More informationWindows 8 & RT Wireless Configuration For NCC Student Owned Laptops
Windows 8 & RT Wireless Configuration For NCC Student Owned Laptops A wireless network for Students to use with their personal laptops, is available throughout campus with the SSID NCC-STUDENT. This network
More informationConnecting to Secure Wireless (iitk-sec) on Fedora
Connecting to Secure Wireless (iitk-sec) on Fedora Go to System Preferences Network Connections. Click on Wireless tab and then Add button. Check Connect automatically and Available to all users. Set SSID
More informationLinksys WAP300N. User Guide
User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating
More informationDual-Band Wireless Network Extender. Model #: WCB3000N. User Manual. Ver 1.0
Dual-Band Wireless Network Extender Model #: WCB3000N User Manual Ver 1.0 Table of Contents Table of Contents 1 Introduction 3 Features 4 Getting to Know the WCB3000N 5 Front Panel 5 Back Panel 5 Accessing
More informationHow To Set up and Configure the WNA-100 Wireless Network Adapter
How To Set up and Configure the WNA-100 Wireless Network Adapter Section 1: Set up and Connect the Adapter to a Computer, Then Configure the Computer to Communicate With the Adapter Before the adapter
More informationQuick Installation Guide
V2.01 IP Wired / Wireless Camera Quick Installation Guide (For Windows OS) Model: FI8602/FI8602W ShenZhen Foscam Intelligent Technology Co., Ltd Packing List Quick Installation Guide 1) IP CAMERA X 1 2)
More informationWindows Vista and Windows 7 Wireless Configuration For NCC Faculty and Staff Owned Laptops
Windows Vista and Windows 7 Wireless Configuration For NCC Faculty and Staff Owned Laptops A wireless network for Faculty and Staff to use with their personal laptops, is available throughout campus with
More informationTECH BULLETIN NETGEN1 DOOR CONTROLLER WI-FI NETWORK CONFIG
TECH BULLETIN NETGEN1 DOOR CONTROLLER WI-FI NETWORK CONFIG February 12, 2008 The factory default network configuration for BlueWave Security s Wi-Fi NetGen1 door controllers is a dynamic DHCP IP address,
More informationUniversity of Hawaii at Manoa Professor: Kazuo Sugihara
University of Hawaii at Manoa Professor: Kazuo Sugihara Assignment 2 (ICS426) Network Setup Tutorials By: Yu Fong Okoji (yokoji@hawaii.edu) 10/27/2009 Tutorial on Home Network Setup INTRODUCTION In this
More informationA Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with RangeBooster User Guide Model No. WMP54GR Copyright and Trademarks Specifications are subject to change without notice.
More informationCS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
More informationOverview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
More informationUsing LAN Wi-Fi (WLAN) 3-2 Connecting Wi-Fi Devices via Wi-Fi (WLAN) 3-3 Connecting Windows 3-5 Connecting Mac 3-8
Wi-Fi (WLAN) -2 Connecting Wi-Fi Devices via Wi-Fi (WLAN) - Connecting WPS Supported Wi-Fi Devices - Connecting Game Consoles - Connecting Android Devices -4 Connecting Windows -5 Windows 7-5 Windows Vista
More informationConnecting to the Rovernet WPA2 Secured Wireless Network with Windows 7
Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7 Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements
More informationUser Guide. E-Series Routers
User Guide E-Series Routers Table of Contents Table of Contents Product overview E900/E1200/E1500/E2500/E3200 1 Back view 1 Bottom view 1 E4200 2 Top view 2 Back view 2 Setting Up Your E-Series Router
More informationVLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
More informationSecuring Your Wireless Network
Choosing A Wireless Router You might already have a wireless router provided to you by your Internet Service Provider. Otherwise, if you are intending to get one or decide to upgrade your old router, look
More informationA Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter. User Guide WIRELESS WMP54G. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter User Guide Model No. WMP54G Copyright and Trademarks Specifications are subject to change without notice. Linksys is a
More informationLast Updated: January 23, 2013 1. FLCCsecure
Last Updated: January 23, 2013 1 FLCCsecure How to Set Up a Secure Wireless Device for Students and Employees Please Note: This packet is a general overview of how to setup the most commonly used personal
More informationHow To. Simply Connected. XWR-1750 Basic Configuration INTRODUCTION
XWR-1750 Basic Configuration How To DOCUMENT INTRODUCTION This document will guide you through the initial setup of the XWR-1750 for basic functionality. What should I do? We recommend, you change your
More informationNetwork Services One Washington Square, San Jose, CA 95192-0209 408-924-1530
SJSU Premier Wi-Fi Service Network Services One Washington Square, San Jose, CA 95192-0209 408-924-1530 The SJSU Premier Wi-Fi service transmits your data across a secure, encrypted connection. This ensures
More informationHow to configure your Thomson SpeedTouch 780WL for ADSL2+
How to configure your Thomson SpeedTouch 780WL for ADSL2+ Connecting up your router This guide assumes that you have successfully: unpacked your router connected it up to your phone socket using the DSL
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
More informationConnecting to Wireless in Windows Vista
Connecting to Wireless in Windows Vista Reference: http://www.microsoft.com/technet/community/columns/cableguy/cg0406.mspx http://www.microsoft.com/technet/network/evaluate/hiddennet.mspx http://www.csd.toshiba.com/cgibin/tais/su/su_sc_dtlview.jsp?soid=1524510&moid=null&bv_sessionid=@@@@0175
More informationTECHNICAL NOTE REFERENCE DOCUMENT. Improving Security for Axis Products. Created: 4 October 2007. Last updated: 11 October 2007. Rev: 1.
TECHNICAL NOTE REFERENCE DOCUMENT Improving Security for Axis Products Created: 4 October 2007 Last updated: 11 October 2007 Rev: 1.0 TABLE OF CONTENTS 1 INTRODUCTION 3 2 BEST-PRACTICE SECURITY POLICIES
More informationHow do I configure the wireless printer using Wi-Fi Protected Setup or AOSS and install the printer driver in Windows?
How do I configure the wireless printer using Wi-Fi Protected Setup or AOSS and install the printer driver in Windows? 1. Confirm your WLAN access point/router has the Wi-Fi Protected Setup or AOSS symbol
More informationTHE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123
THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 CONFIGURING YOUR HOME WIRELESS NETWORK Presented by: Mr. Eric Fan, Chairman, PISA Knowledge 123 Firmware 軟 韌 體 Knowledge 123 Home Network Functions
More informationWindows Vista: Connecting to the fastnsecure@hood wireless network at Hood College
Windows Vista: Connecting to the fastnsecure@hood wireless network at Hood College Please ensure your computer meets the following criteria in order to successfully make a connection to this network: 802.11n
More informationYO-301AP POE AP Datasheet
YO-301AP POE AP Datasheet 300Mbps Wi-Fi Ceiling POE Access Point VER:1.0 Date:2013-06-03 1 Product Description: Practical and powerful The Ceiling PoE wireless access point for your home or office network
More informationSeamless and Secure Access (SSA) Manual Configuration Guide for Windows 7
Seamless and Secure Access (SSA) Manual Configuration Guide for Windows 7 Page 1 1 Enable Wi-Fi a) Please refer to your computer s user manual to enable the Wireless (Wi-Fi) connection. b) Please click
More informationMac OS X Secure Wireless Setup Guide
Mac OS X Secure Wireless Setup Guide Requirements: Apple computer with built-in AirPort card capable of WPA2-Enterprise encryption Mac OS X Snow Leopard version 10.6.0 or greater or Mac OS X Lion version
More informationEAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater
EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at
More informationLW310V2 Sweex Wireless 300N Router
LW310V2 Sweex Wireless 300N Router Please notice! On the included CD-ROM you will find the Setup Wizard. This easy install procedure will show you how to setup the router step-by-step. Do not expose the
More informationSMC7901WBRA2-B1 Installation Guide
SMC7901WBRA2-B1 Installation Guide Model number: SMC7901WBR2- B1 Topic: Wireless Encryption (WPA) c. Click WLAN Security. Choose WPA2 Mixed under Encryption. Enter a password in the Pre- Shared Key and
More informationINFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
More informationQuick Installation Guide For Mac users
Quick Installation Guide For Mac users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include
More informationWireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
More informationUSER GUIDE AC2400. DUAL BAND GIGABIT Wi Fi ROUTER. Model# E8350
USER GUIDE AC2400 DUAL BAND GIGABIT Wi Fi ROUTER Model# E8350 Table of Contents Product overview E8350..................................... 1 Setting Up Your E-Series Router Where to find more help.........................
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationHow To Secure A Wireless Network With A Wireless Device (Mb8000)
MB8000 Network Security and Access Control Overview MB8000 employs almost all of the current popular WLAN security mechanisms. These include wireless-user isolation, closed system (by turning off SSID
More informationNETWORK USER S GUIDE. Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server
Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server NETWORK USER S GUIDE This Network User's Guide provides useful information of wired and wireless
More informationBeef O Brady's. Security Review. Powered by
Beef O Brady's Security Review Powered by Why install a Business Class Firewall? Allows proper segmentation of Trusted and Untrusted computer networks (PCI Requirement) Restrict inbound and outbound traffic
More informationState of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture
State of Kansas Interim Wireless Local Area Networks Security and Technical Architecture October 6, 2005 Prepared for Wireless Policy Committee Prepared by Revision Log DATE Version Change Description
More informationRecommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
More informationOnline Banking Fraud Prevention Recommendations and Best Practices
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know
More informationBASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE
BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE 12/11/2012 Index 1 INTRODUCTION... 1-1 2 FACTORY DEFAULT SETTINGS... 2-1 3 CPE BASIC OPERATIONS... 3-1 3.1 PASSWORD MODIFICATION...
More informationWiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
More informationParticularities of security design for wireless networks in small and medium business (SMB)
Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, tomai@econ.ubbcluj.ro
More informationPotential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University
Potential Security Vulnerabilities of a Wireless Network Implementation in a Military Healthcare Environment Jason Meyer East Carolina University Abstract This paper will look into the regulations governing
More informationConfiguring the wireless security of your Linksys Wireless-N router through the web-based setup page
Contents Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page.. 2 Checking the Linksys router s wireless settings through the web-based setup page and adding
More informationWireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No.
2,4 GHz WIRELESS Wireless-N PCI Adapter User Guide Model No. WMP300N (EU) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of
More informationMassey University Wireless Network - Client
Massey University Wireless Network - Client Configuration Windows Mobile 5/6 Windows Mobile wireless network Requirements Information Technology Services You must have an active Massey network account,
More informationUSER GUIDE AC2600 MU-MIMO GIGABIT ROUTER. Model# EA8500
USER GUIDE AC2600 MU-MIMO GIGABIT ROUTER Model# EA8500 Table of Contents Product overview EA8500.....................................1 Setting Up Your Router Where to find more help.........................
More informationEdith Cowan University Information Technology Services Centre
Information There are three wireless networks on campus which give you access to the ECU website, the staff intranet, the internet and other ECU resources: ECU This is the easiest to use and safest wireless
More informationFAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering?
FAQs: MATRIX NAVAN CNX200 Q: How to configure port triggering? Port triggering is a type of port forwarding where outbound traffic on predetermined ports sends inbound traffic to specific incoming ports.
More informationrunning operation mode painless TECHNICAL SPECIFICATION WAN/LAN: One 10/100 Fast Ethernet RJ-45 WPS (WiFi Protected Setup) WAN (Internet connection)
PRODUCT DESCRIPTION ETR9350 is a 2T2R Wireless Single chip 11N Travel AP/Router that delivers up to 6x faster speeds than 802.11g devices. ETR9350 drives superior performance and unparalleled wireless
More informationWireless Network Best Practices for General User
Wireless Network Best Practices for General User I n Hong Kong, the number of Wi-Fi access points (hotspots) has reached 31,000 in 2015 1. Unfortunately, not all of them are well-protected. In fact, wireless
More informationQuick Installation Guide-For MAC users
Quick Installation Guide-For MAC users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include
More informationICT DEPARTMENT. Windows 7. Wireless Authentication Procedures for Windows 7 & 8 Users For Linux and windows XP users visit ICT office
ICT DEPARTMENT Wireless Authentication Procedures for Windows 7 & 8 Users For Linux and windows XP users visit ICT office Requirements: 1. Wireless enable laptop with Valid Anti-Virus 2. Configure your
More information