How To Secure Your Wireless Network With A Router (Nica) And A Network (Nipo) Card (Nic)

Size: px
Start display at page:

Download "How To Secure Your Wireless Network With A Router (Nica) And A Network (Nipo) Card (Nic)"

Transcription

1 Wireless Network Security A self-instructional module Will Dressler Ryan Garcia Branden Hazlet ETEC 603 P. Leong February 2008

2 Wireless Network Security 1 Table of Contents Module Pre-test 2 Introduction. 3 Chapter 1: Securing Your Router Interface... 6 Review 6 Review Key and Explanations 6 Chapter 2: Wireless Encryption... 7 Review 7 Review Key and Explanations 7 Chapter 3: SSID Broadcast... 8 Review 10 Review Key and Explanations 11 Chapter 4: MAC Address Filtering Review 16 Review Key and Explanations 17 Module Post-test. 18

3 Wireless Network Security 2 Module Pre-test Please take this brief Pre-test so that we can assess your knowledge before you begin the module. 1. When a wireless router performs an SSID broadcast, what does it do? A. It sends out a code linked to a time signature for address resolution. B. It provides an interface console IP address for access via the web. C. It broadcasts the identification number of the machines network interface card physical address. D. It sends out a signal to identify itself by name and introduce its signal to computers in the area. 2. If you disable the SSID Broadcast from a wireless router, you have prevented. A. NIC s with unregistered MAC addresses from accessing your router. B. hackers from decoding your encryption passphrase. C. virus infected machines from accessing your registry keys. D. computers from automatically detecting the existence and name of your network signal. 3. What is the function of a MAC Address? A. It is a 12 character address used to allow other computers to find the location of your web page. B. It is unique and never changing address used for identification on a Network Interface Card. C. It is a code for encrypting a signal so that people without the appropriate passphrase can not decode your message. D. It is a network protocol used to resolve GPS coordinates into a Physical Address. 4. MAC Address Filtering is a wireless security strategy that uses A. a list of pre-approved computer identification numbers to block out any unapproved computers. B. a code for encrypting a signal so that people without the appropriate passphrase can not decode your message. C. a network protocol used to block machine coordinates that do not have the right registration on the domain. D. an electronic camouflage to hide wireless information among the radio waves and cell phone signals that otherwise would be filtered out.

4 Wireless Network Security 3 Introduction Two relevant trends are coinciding in the technology industry: cyber-crimes are on the rise and wireless routers are becoming dramatically more common as they continue to come down in price. The decrease in price of wireless routers has led to a proliferation of unsecured wireless networks in the homes and offices of people who don't understand wireless security concepts. While all brands of routers come with basic how-to instructions that allow the user to navigate the router management interface, the instructions do not explain the concepts behind the router options to create a layered approach to wireless security. In this module you will learn about the concepts underlying four different strategies of wireless security. These four strategies include: limiting router interface access, disabling SSID broadcast, MAC address filtering and wireless encryption. Taken alone, each of these components can provide some minimal protection to your wireless network, but when used in combination, they will provide substantial protection using layers of different defense strategies. Much as a home burglar looks for easy prey, such as homes that have open doors or windows, hackers look for unprotected or weakly protected networks to steal confidential information. Understanding how a layered approach to wireless security works can help you prevent unwanted access to your network and the possible theft of personal information. To introduce the concepts behind these four strategies we will continue with the more familiar metaphor of home security. Specifically, we will use a metaphor based on strategies for securing the most important documents in your home -- i.e. financial records, passports, birth certificates, memorabilia, etc.

5 Wireless Network Security 4 Obviously the first step to securing your documents within your home is simply to control access to your home shut and lock your doors and windows. This basic strategy of home security parallels wireless security in terms of limiting access to your wireless router interface, simply shut and lock the door to your router to prevent the easiest path of unwanted access. In this metaphor, your door key will be a unique and complex password for your router interface access. A second level of defense in our metaphor of securing your home documents would be hiding the documents, possibly even camouflaging them in a compartment behind a framed photograph or poster. In terms of wireless security the analogous strategy would be disabling SSID broadcast, a strategy that essentially hides the signal coming from your wireless router so that it is not as easily discovered by people searching for a connection. If someone were to find your network, as if they were to find your documents, they could easily access your information. However, just by hiding the signal through disabling the SSID broadcast you make your information a good bit harder to get to. Our third comparison of home document security and wireless security is based on secret codes. For your sensitive financial information, including account numbers and PIN number for ATM cards, you might want to confuse anyone who discovered these records by adding 5 to every number; for example if your PIN number was , you could record it in your records as Thus even if someone found your records they still wouldn t know your PIN number unless they could figure out that the secret to decode the PIN number was to subtract 5 from the written information to get the correct information. The equivalent wireless security strategy is encryption, whereby information passed between a computer and the router is incomprehensible unless the computer knows the key for the secret code.

6 Wireless Network Security 5 Our final security metaphor is the coup de grâce, in terms of home document security it might be considered a little home vault or safe that requires a fingerprint ID to open. No one would be able to access the documents unless their fingerprint was preapproved to open the safe. In terms of wireless security this metaphor represents MAC address filtering, essentially using a fingerprint from the computer to check against a preapproved list of computers allowed to access to the wireless router. Taken individually, each of these components provides some basic security, but taken together, the combination of each of these unique strategies adds up to a powerful multilayered security system which would prevent all but the most skilled and lucky burglar from infiltrating your information. If your documents are locked securely behind your doors and windows, hidden behind a picture on the wall, encoded in secret cryptography, and locked in a fingerprint accessed vault -- you might fairly say you have document security. Likewise a wireless router employing interface access limits, disabled SSID broadcasting, encryption and MAC address filtering can be considered fairly secure. In both cases there is no such thing as absolute security, but by correctly employing many different layered strategies your degree of total security is improved tremendously.

7 Wireless Network Security 6 Chapter 1: Securing Your Router Interface Review Review Key and Explanations. These Chapters are intentionally left blank. For the purposes of this assignment they have not yet been developed.

8 Wireless Network Security 7 Chapter 2: Wireless Encryption Review Review Key and Explanations. These Chapters are intentionally left blank. For the purposes of this assignment they have not yet been developed.

9 Wireless Network Security 8 Chapter 3: SSID Broadcast Chapter 3 has two skill sets for you to master: Section A. Identify the function of an SSID. Section B. Determine how disabling the SSID Broadcast can contribute to wireless security. Section A. Identify the function of an SSID Service Set Identifiers (SSIDs) are the Names of wireless routers. To have a computer talk to the router, the computer first must know that the router exists and then must know the name, SSID, of the router. To make it easy to connect to a wireless router, the router usually sends out a broadcast that is picked up by all wireless computers within range; this broadcast is essentially the router introducing itself, Hello, my name is (some SSID) and I m here to connect with you if you want. Initially, almost all routers come with the default SSID of the manufacturers name, i.e. Dlink, Linksys, Cisco, Netgear, 3Com, etc. Leaving the default name intact is a clue for any hacker that the network is not secure and it often can give them easy access to the default router interface username and password, which can be easily found from manufacturers websites. Example and Non-Example: If there are two wireless routers in a neighborhood, Router A and Router B, when a laptop scans for wireless signals, it will detect these two separate signals according to their SSID. For example, Router A may have the default factory name of Linksys, while Router B could have the name Gypsy Radio. In this case of Router A, Linksys, it still has the default SSID provided by the manufacturer. The SSID gives away the manufacturer of the router, which can be used to search the internet for the default administrator username and password. Router B, on the other hand, has a unique SSID, Gypsy Radio, which prevents hackers from knowing the manufacturer and the associated default password of the router. A hacker would more easily infiltrate Router A.

10 Wireless Network Security 9 Section B. Determine how disabling the SSID Broadcast can contribute to wireless security To refer back to our metaphor of securing your home documents, the second level of defense after closing your doors and windows, would be to hide your documents. For instance, you might hide them by them by putting them in a compartment that is camouflaged behind a framed photograph hung on the wall. In terms of wireless security the analogous strategy would be disabling SSID broadcast, a strategy that essentially hides the signal coming from your wireless router so that it is not as easily discovered by people searching for a connection. If someone were to find your network, as if they were to find your documents, they could easily access your information. However, just by hiding the signal by disabling the SSID broadcast you make your information a good bit harder to get to. If Disable the SSID broadcast is selected in the router interface, the router is prevented from sharing its name and availability. Therefore, most computers won t discover the existence of the router and wireless signal, much less connect to it. Example and Non-Example: There are two wireless routers in the room, Router X and Router Y. Both X and Y are internet connected and neither requires a password. The routers are configured exactly the same except for the SSID broadcast settings: Router X has SSID broadcast enabled, while Y has SSID broadcast disabled. When a laptop is turned on in the room, it will only detect one signal- Router X. The laptop will not detect a signal from Router Y because Router Y is not broadcasting its SSID. Router Y is essentially hidden from the laptop, therefore, Router Y is more secure because disabling its SSID broadcast has made it harder to find.

11 Wireless Network Security 10 Chapter 3: SSID Broadcast Review 1. Wireless routers send out signals to identify themselves and introduce their signal to computers in the area. What is this called? A. SSID Broadcast B. Interface Access Announcement C. WEP Encryption Key D. MAC Address Sharing 2. Wireless routers usually send out signals with their names and availability for connection to all computers in the area. If you configure a router to prevent this signal from going out, what have you done? A. Implemented WEP Encryption Keys B. Corrupted the Interface Access Announcement C. Disabled SSID Broadcast D. Disabled MAC Address Sharing

12 Wireless Network Security 11 Chapter 3: SSID Broadcast Review Key and Explanations 1. Wireless routers broadcast a signals to identify themselves and introduce their signal to computers in the area. What is this called? A. *SSID Broadcast Correct, the SSID Broadcast is a signal to identify the router and introduce its signal to computers in the area. B. Interface Access Announcement Incorrect, the interface is not a signal C. *. WEP Encryption Key Incorrect, encryption is coded signals. D. MAC Address Sharing Incorrect, MAC addresses identify the NIC, not the router. 2. Wireless routers usually send out signals with their names and availability for connection to all computers in the area. If you configure a router to prevent this signal from going out, what have you done? A. Implemented WEP Encryption Keys Incorrect, encryption is coded signals. B. Corrupted the Interface Access Announcement Incorrect, the interface is not a signal C. * Disabled SSID Broadcast Correct, if you prevent your router from sending out a signal with its name and availability for connection to all computers in the area then you have Disabled SSID Broadcast. D. Disabled MAC Address Sharing Incorrect, MAC addresses identify the NIC, not the router.

13 Wireless Network Security 12 Chapter 4: MAC Address Filtering Chapter 3 has two skill sets for you to master: Section A:. Identify the function of a Media Access Control (MAC) address on a Network Interface Card. Section B: Determine how MAC Address filtering can contribute to wireless security. Section A: Identify the function of a MAC address on a NIC A computer uses a network interface card (NIC) to get on the internet. Each NIC has a unique identification code called a Media Access Control (MAC) address. The MAC address is also sometimes called the Physical Address because it is physically hard coded into the Network Interface Card. This MAC address is used for identification in the same way people use fingerprints or Social Security Numbers, a unique identifier that is connected to you. The MAC address is actually written as 12 characters arranged in six sets of two, with each set of characters separated either by colons or hyphens. Because MAC addresses are unique, like a person s fingerprints, no two are the same across the world. And because they are located on the computer s NIC, including wireless NIC s, they provide an individual identification for each computer when it connects to a network. Example 1: In this example we see a picture of a Network Interface Card (NIC) that has been removed from a computer. Note that on the left side of the front of the card is a sticker that has the MAC Address -- six sets of two characters ( A 63) that uniquely identify this card and any computer that would use this card for a network connection. The important concept to note here is that the MAC address is coded into the NIC itself, and never changes, even if the card is removed from the computer.

14 Wireless Network Security 13 Example 2: Here is a screenshot that contains information about the NIC and the MAC address for a wireless NIC installed in a computer. The first highlighted line says Ethernet adapter Wireless Network Connection: which indicates that we are looking at data for the wireless NIC. In the second highlighted line, titled Physical Address: is where we see a 12-character sequence of six sets of 2 characters separated by hyphens; this is the MAC Address. The important thing to recognize from this example is that the MAC address is part of the NIC data for the network connection. Non-Examples: Note the line that says IP address in example 2 above. The IP address that a computer uses for communicating with the internet is different than the MAC Address in important ways. IP addresses are not always unique and in fact sometimes change dynamically such that a new address is assigned every time a computer connects to the network. This is different because MAC addresses are constant, they are always the same for the particular NIC they are coded into and always stay the same when the computer connects to the network day after day.

15 Wireless Network Security 14 Section B: Determine how MAC Address Filtering Can Contribute to Wireless Security To begin our discussion of MAC address filtering let us refer back to our metaphor in terms of home document security. MAC address filtering could be said to be analogous to a little home vault or safe that requires a fingerprint ID to open. No one would be able to access the documents unless their fingerprint was preapproved to open the safe. In terms of wireless security this metaphor represents MAC address filtering, essentially using a fingerprint from the computer to check against a preapproved list of computers allowed to access to the wireless router. MAC address filtering is a way of coding into the router a limited list of computers that are allowed to talk to the router. Every network interface card (NIC), whether it is a wireless or a wired connection card, has a MAC Address. The MAC address is a totally unique character set for every individual NIC, so it can therefore be used to identify individual machines that connect to the network. MAC address filtering is a way of blocking all machines from attaching to the router except for the ones that are specifically allowed by previously entering them into the router s list of pre-approved MAC Addresses. It s like having a bouncer at a nightclub who only lets in people whose name is on a list. This is a strong way to keep unwanted computers from connecting to the router, but it can also be tedious to update when new computers or guests want to connect to the wireless network. Example: Router MAF has MAC address filtering enabled so only computers whose MAC addresses have been approved and entered into the interface by the router administrator will be able to connect to Router MAF. Even if a hacker discovers the router s SSID and Encryption key, she will have a much more difficult time connecting

16 Wireless Network Security 15 with Router MAF, because her computer will not be in the preapproved list that MAC address filtering allows into the router. Non-Example: Router X does not have MAC address filtering enabled. If a hacker discovers the router s SSID and Encryption key he will be able to connect with Router X.

17 Wireless Network Security 16 Chapter 4: Review 1. The unique identification number that never changes on a Network Interface Card is called the: A. Internet Protocol (IP) Address B. Media Access Control (MAC) address C. Serial Number (S/N) D. Special Security Number (SSN) 2. If you restrict access to your wireless network based on the unique identification number on the connecting computers Network Interface Card (NIC), what security strategy are you using? A. WEP Encryption Key B. Interface Access Pass Code C. SSID Number Blocking D. MAC Address Filtering

18 Wireless Network Security 17 Chapter 4: MAC Address Filtering Review Key and Explanations 1. The unique identification number that never changes on a Network Interface Card is called the: A. Internet Protocol (IP) Address - Incorrect. IP addresses do change. B. Media Access Control (MAC) address - Correct, the MAC Address is a unique identification number that never changes on a Network Interface Card. C. Serial Number (S/N) - Incorrect. The serial number refers to the make and model of the NIC. D. Special Security Number (SSN) - Incorrect. This is a fictional item. 2. If you restrict access to your wireless network based on the unique identification number on the connecting computers Network Interface Card (NIC), what security strategy are you using? A. WEP Encryption Key Camouflage Incorrect, encryption keys are for decoding signals. B. Interface Access Code Filtering Incorrect, the interface is not on the NIC. C. SSID Broadcast Interrupt Incorrect, the SSID is not on the NIC. D. MAC Address Filtering Correct, MAC Address Filtering restricts access to your wireless network based on the unique identification number on the connecting computers Network Interface Card (NIC),

19 Wireless Network Security 18 Module Post-test Please take this brief Post-test so that we can assess what you have learned from this module. 1. The function of an SSID broadcast can best be described as A. sending out a signal to identify the computer by name and introduce its signal to computers in the area. B. providing an interface console IP address for access via the web. C. sending out the identification number of the machines network interface card physical address. D. sending out a code linked to a time signature for address resolution. 2. If you do not disable the SSID Broadcast from a wireless router, you will allow. A. NIC s with unregistered MAC addresses from accessing your router. B. hackers from decoding your encryption passphrase. C. computers from automatically detecting the existence and name of your network signal D.. virus infected machines from accessing your registry keys. 3. The function of a MAC address can best be described as? A. a 12 character address used to allow other computers to find the location of your web page. B..a code for encrypting a signal so that people without the appropriate passphrase can not decode your message. C. a unique and never changing address used for identification on a Network Interface Card D. a network protocol used to resolve GPS coordinates into a Physical Address. 4. Which of the following best describes MAC address filtering? A.. an electronic camouflage to hide wireless information among the radio waves and cell phone signals that otherwise would be filtered out. B. a code for encrypting a signal so that people without the appropriate passphrase can not decode your message. C. a network protocol used to block machine coordinates that do not have the right registration on the domain. D. a list of pre-approved computer identification numbers to block out any unapproved computers

Top 10 Security Checklist for SOHO Wireless LANs

Top 10 Security Checklist for SOHO Wireless LANs Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN

More information

Top 10 Security Checklist for SOHO Wireless LANs

Top 10 Security Checklist for SOHO Wireless LANs Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders. Dan Farmer, System Administrators Guide to Cracking

More information

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

Configuring Routers and Their Settings

Configuring Routers and Their Settings Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because

More information

Computing From Home. How to Access Rowan Network Resources When you Are Not On Campus. Marc Fleischner Network and System Services

Computing From Home. How to Access Rowan Network Resources When you Are Not On Campus. Marc Fleischner Network and System Services Computing From Home How to Access Rowan Network Resources When you Are Not On Campus. Marc Fleischner Network and System Services There is no reason for any individual to have a computer in his home. Ken

More information

Chapter 3 Safeguarding Your Network

Chapter 3 Safeguarding Your Network Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate

More information

Question How do I access the router s web-based setup page? Answer

Question How do I access the router s web-based setup page? Answer http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=3676 Question How do I access the router s web-based setup page? Answer All Linksys routers have a built-in web-based setup

More information

Configuring Your Network s Security

Configuring Your Network s Security Configuring Your Network s Security Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

Securing your Linksys WRT54G

Securing your Linksys WRT54G Securing your Linksys WRT54G Abstract Current implementations of the 802.11b and 802.11g wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms in these

More information

Securing your Linksys Wireless Router BEFW11S4 Abstract

Securing your Linksys Wireless Router BEFW11S4 Abstract Securing your Linksys Wireless Router BEFW11S4 Abstract Current implementations of the 802.11b wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms

More information

N300 WiFi Range Extender WN2000RPT User Manual

N300 WiFi Range Extender WN2000RPT User Manual N300 WiFi Range Extender WN2000RPT User Manual December 2013 202-11333-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device,

More information

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 CONFIGURING YOUR HOME WIRELESS NETWORK Presented by: Mr. Eric Fan, Chairman, PISA Knowledge 123 Firmware 軟 韌 體 Knowledge 123 Home Network Functions

More information

Security. TestOut Modules 12.6 12.10

Security. TestOut Modules 12.6 12.10 Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card

More information

Chapter 2 Wireless Settings and Security

Chapter 2 Wireless Settings and Security Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless

More information

Home Wi-Fi Gateway Instructions

Home Wi-Fi Gateway Instructions Home Wi-Fi Gateway Instructions 1. Connect the gateway. Use the coaxial cable provided by BendBroadband to connect the cable port (A) to your cable outlet. 2. Connect your computer to the cable modem gateway

More information

N300 WiFi Range Extender

N300 WiFi Range Extender Model EX2700 User Manual July 2014 202-11395-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on

More information

Configuring Your Network s Security

Configuring Your Network s Security Configuring Your Network s Security Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible

More information

A quick Guide to your Super Hub 2ac

A quick Guide to your Super Hub 2ac A quick Guide to your Super Hub 2ac HELLO. W el c o m e t o t h i s h a n d y g u i d e t o y o u r n ew v i r g i n m e d i a b u s i n e s s b r o a d b a n d. What s inside Getting to know your Super

More information

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Hackers can easily trap information transmitted over wireless network, it has to be encrypted to avoid unauthorized users

More information

Frequently Asked Questions

Frequently Asked Questions FAQs Frequently Asked Questions Connecting your Linksys router to the Internet 1 What computer operating systems does my Linksys router support? 1 Why can t I connect my computer or device to my router?

More information

Linksys Wireless G WRT54G

Linksys Wireless G WRT54G Router Configuration Note Linksys Wireless G WRT54G Version 1.0 Scope This document describes how to configure the Linksys Wireless G WRT54G router to work with LucidLink Wireless Security Software, version

More information

Linksys WAP300N. User Guide

Linksys WAP300N. User Guide User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating

More information

Wi-Fi and security Wireless Networking and Security by Alain RASSEL

Wi-Fi and security Wireless Networking and Security by Alain RASSEL Wi-Fi and security Wireless Networking and Security by Alain RASSEL 1 23.11.04 Overview: Simple configuration example Obvious simple protection means Change Administrator Password Restrict administrator

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

AC750 WiFi Range Extender

AC750 WiFi Range Extender Model EX6100 User Manual April 2014 202-11307-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number

More information

Figure 1. The Motorola SB4200 cable modem

Figure 1. The Motorola SB4200 cable modem Setting Up a Home Wireless Network What You Need If you're still using a dial-up modem to access the Internet, it's time to consider broadband. Depending on where you live, you can either opt for a cable

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005 Vantage RADIUS 50 Quick Start Guide Version 1.0 3/2005 1 Introducing Vantage RADIUS 50 The Vantage RADIUS (Remote Authentication Dial-In User Service) 50 (referred to in this guide as Vantage RADIUS)

More information

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous

More information

Computer Networking. Definitions. Introduction

Computer Networking. Definitions. Introduction Computer Networking Definitions DHCP Dynamic Host Configuration Protocol It assigns IP addresses to client devices, such as desktop computers, laptops, and phones, when they are plugged into Ethernet or

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

Network Security Best Practices

Network Security Best Practices CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual

More information

Mechanic Handheld Wireless Access Point Setup Guide

Mechanic Handheld Wireless Access Point Setup Guide Pre-Installation Manual Mechanic Handheld Wireless Access Point Setup Guide February 2014 / 10-095400-085 Mechanic Handheld Wireless Access Point Setup Guide Pre-Installation Manual February 2014 by the

More information

Wireless LAN Security: Securing Your Access Point

Wireless LAN Security: Securing Your Access Point IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty

More information

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.

More information

DV230 Web Based Configuration Troubleshooting Guide

DV230 Web Based Configuration Troubleshooting Guide DV230 Web Based Configuration Troubleshooting Guide 1. Login settings After getting a DHCP IP address from your P1 W1MAX Modem DV-230), open any Internet browser and type in the URL address: http://10.1.1.254

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

INFORMATION TECHNOLOGY. Revised May 07. Home Networking Guide

INFORMATION TECHNOLOGY. Revised May 07. Home Networking Guide INFORMATION TECHNOLOGY Revised May 07 Home Networking Guide Contents Introduction... 3 Intent... 3 Disclaimer... 3 Rexnord Support limitations... 3 Remotely Connecting to the Rexnord Data Network... 3

More information

Safe Practices for Online Banking

Safe Practices for Online Banking November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.

More information

Chapter 3 Connecting the Router to the Internet

Chapter 3 Connecting the Router to the Internet Chapter 3 Connecting the Router to the Internet This chapter describes how to set up the router on your Local Area Network (LAN) and connect to the Internet. It describes how to configure your DG834GT

More information

wireless broadband information

wireless broadband information wireless broadband information what is wireless? contents When we talk about a Wireless connection we are referring to the way you connect your PC or laptop to your router. Wireless broadband, also known

More information

Preparing the Computers for TCP/IP Networking

Preparing the Computers for TCP/IP Networking Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address

STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address Title: How do I configure the wireless printer without a network cable and install the printer driver in Windows? NOTE: For successful wireless setup, you MUST know your network security settings. STEP

More information

RingCentral Router Configuration. Basic Start Guide for Administrators

RingCentral Router Configuration. Basic Start Guide for Administrators RingCentral Router Configuration Basic Start Guide for Administrators RingCentral Router Configuration Basic Start Guide for Administrators Contents 3 Getting Started 4 Quality of Service 4 Test Your Connection

More information

Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page

Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page Contents Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page.. 2 Checking the Linksys router s wireless settings through the web-based setup page and adding

More information

High Speed Internet, Welcome Kit. If your apartment is served by Ethernet: How do I connect to the network if not using a router?:

High Speed Internet, Welcome Kit. If your apartment is served by Ethernet: How do I connect to the network if not using a router?: High Speed Internet, Welcome Kit We provide a WIRED High Speed Internet connection to your apartment. Your apartment will be served by a DSL modem or Ethernet jack. If you have multiple users in your apartment

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

Access Point Configuration

Access Point Configuration Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give

More information

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for

More information

Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples

Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication

More information

WiFi-SB-L3 300M WiFi Router WiFi Bridge WiFi Repeater. WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide

WiFi-SB-L3 300M WiFi Router WiFi Bridge WiFi Repeater. WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide 300M WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide 1 Chapter 1 Router Mode Quick Setup Guide 1. Let WiFi-SB-L3 be powered on. 2.Turn on wireless network connection, disabled local

More information

8 Steps for Network Security Protection

8 Steps for Network Security Protection 8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because

More information

How To. Simply Connected. XWR-1750 Basic Configuration INTRODUCTION

How To. Simply Connected. XWR-1750 Basic Configuration INTRODUCTION XWR-1750 Basic Configuration How To DOCUMENT INTRODUCTION This document will guide you through the initial setup of the XWR-1750 for basic functionality. What should I do? We recommend, you change your

More information

Wireless Encryption Protection

Wireless Encryption Protection Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost

More information

8 Steps For Network Security Protection

8 Steps For Network Security Protection 8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their

More information

User Guide. E-Series Routers

User Guide. E-Series Routers User Guide E-Series Routers Table of Contents Table of Contents Product overview E900/E1200/E1500/E2500/E3200 1 Back view 1 Bottom view 1 E4200 2 Top view 2 Back view 2 Setting Up Your E-Series Router

More information

AXIS 207W Network Camera Technical Information

AXIS 207W Network Camera Technical Information A few things that should help you get the AXIS 207W connected to your network. It s not always easy to install new products on your network and this document describes some of the things you may need to

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

Digicom Remote Control for the SRT

Digicom Remote Control for the SRT Digicom Remote Control for the SRT To operate the SRT remotely, use Remote Desktop; this is available free for Linux, Mac OS-X (from Microsoft), and is included with Windows XP and later. As RD uses a

More information

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to: Network Security Chapter 12 Learning Objectives After reading this chapter, you should be able to: Recognize the basic forms of system attacks Recognize the concepts underlying physical protection measures

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Chapter 15: Computer and Network Security

Chapter 15: Computer and Network Security Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e What is in a security policy Mobile device security methods and devices To perform operating system and data protection How

More information

Setting Up Your Wireless Network

Setting Up Your Wireless Network Setting Up Your Wireless Network 1 TABLE OF CONTENTS Wireless Tips... 3 Terminology... 4 Motorola 2247... 5 Logging In:... 5 Changing the SSID/network name... 6 Westell Model 7500... 12 Configuration of

More information

N600 WiFi USB Adapter

N600 WiFi USB Adapter Model WNDA3100v3 User Manual December 2014 202-11470-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial

More information

Chapter 4 Managing Your Network

Chapter 4 Managing Your Network Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration

More information

Wi-Fi Settings Guide. Model No. SP 212/SP 213 Series

Wi-Fi Settings Guide. Model No. SP 212/SP 213 Series Wi-Fi Settings Guide Model No. SP 212/SP 213 Series Introduction There are two wireless LAN modes: infrastructure mode for connection through an access point and ad-hoc mode for establishing direct connection

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

Why is a strong password important?

Why is a strong password important? Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

Link Link sys E3000 sys RE1000

Link Link sys E3000 sys RE1000 User Guide High Performance Extender Wireless-N Router Linksys Linksys RE1000 E3000Wireless-N Table of Contents Contents Chapter 1: Product Overview 1 Front 1 Top 1 Bottom 1 Back 2 Chapter 2: Advanced

More information

Practice test 220-802 Domain-2 Security (Brought to you by RMRoberts.com)

Practice test 220-802 Domain-2 Security (Brought to you by RMRoberts.com) Practice test 220-802 Domain-2 Security (Brought to you by RMRoberts.com) 1. Which command is used to access the local group policy editor for Windows 7? A. poledit.exe B. gpedit.msc C. local.msc D. grplocal.exe

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

Integrating a Hitachi IP5000 Wireless IP Phone

Integrating a Hitachi IP5000 Wireless IP Phone November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition

More information

2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21

2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21 Contents 1 Networking Basics............................................... 1 Selecting a network connection........................................ 2 Wired Ethernet network...........................................

More information

AC1200 WiFi Range Extender

AC1200 WiFi Range Extender Model EX6200 User Manual February 2014 202-11298-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number

More information

Basic Computer Security Part 2

Basic Computer Security Part 2 Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

Manual Wireless Extender Setup Instructions. Before you start, there are two things you will need. 1. Laptop computer 2. Router s security key

Manual Wireless Extender Setup Instructions. Before you start, there are two things you will need. 1. Laptop computer 2. Router s security key 1 Manual Wireless Extender Setup Instructions Before you start, there are two things you will need. 1. Laptop computer 2. Router s security key Setting up LAN Static IP on PC We need to set up a Static

More information

AC1900, N900, and N450 WiFi Cable Data Gateways

AC1900, N900, and N450 WiFi Cable Data Gateways AC1900, N900, and N450 WiFi Cable Data Gateways Models C6300BD, CG4500BD, and CG3000Dv2 User Manual March 2015 202-11434-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items

More information

Connecting to Wireless networks and hotspots

Connecting to Wireless networks and hotspots Connecting to Wireless networks and hotspots How to connect to a wireless network on the ipad and troubleshoot problems The ipad is ultimately a device that allows you to consume content in an easy and

More information

Using Microsoft Vista and Windows XP to Manage Wireless Network Connections

Using Microsoft Vista and Windows XP to Manage Wireless Network Connections Application Note Using Microsoft Vista and Windows XP to Manage Wireless Network Connections Summary This document explains how to use Microsoft Vista and Windows XP (SP2 and SP 1) to join a wireless network

More information

ALL0237R. Wireless N 300Mbit Access Point/Repeater. User s Manual

ALL0237R. Wireless N 300Mbit Access Point/Repeater. User s Manual ALL0237R Wireless N 300Mbit Access Point/Repeater User s Manual ALLNET ALL0237R User Manual Table of Contents About the Device... 3 Minimum System Requirements... 5 Package Contents... 5 Device Overview...

More information

A6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual

A6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual 802.11ac USB 3.0 Dual Band User Manual August 2014 202-11373-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the

More information

How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?

How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)? Is it really necessary for the three ports mentioned in Troubleshooting (UDP 88, UDP 3074, and TCP 3074) to be opened for Xbox Live to work properly? Most cable/dsl routers implement Network Address Translation

More information

Wireless Local Area. Network Security

Wireless Local Area. Network Security Wireless Local Area Network Security HONORS PROJECT CIS 345/ Section 131 Spring 2005 Mentor: Prof. C.S. Rani The first part of this research paper will answer questions such as: what is wireless, how wireless

More information

USER GUIDE AC2400. DUAL BAND GIGABIT Wi Fi ROUTER. Model# E8350

USER GUIDE AC2400. DUAL BAND GIGABIT Wi Fi ROUTER. Model# E8350 USER GUIDE AC2400 DUAL BAND GIGABIT Wi Fi ROUTER Model# E8350 Table of Contents Product overview E8350..................................... 1 Setting Up Your E-Series Router Where to find more help.........................

More information

How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking

How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking Chapter 7 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax NEXT Wireless Router WNR854T. These features can be found by clicking on the Maintenance

More information

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 9, Sep 2015, pp. 65-74, Article ID: IJECET_06_09_008 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=9

More information

Securing Your Wireless Network

Securing Your Wireless Network Choosing A Wireless Router You might already have a wireless router provided to you by your Internet Service Provider. Otherwise, if you are intending to get one or decide to upgrade your old router, look

More information

FI8910W Quick Installation Guide. Indoor MJPEG Pan/Tilt Wireless IP Camera

FI8910W Quick Installation Guide. Indoor MJPEG Pan/Tilt Wireless IP Camera Model: FI8910W Quick Installation Guide (For Windows OS) (For MAC OS please go to page 17) Indoor MJPEG Pan/Tilt Wireless IP Camera Black White Package Contents IP Camera FI8910W with IR-Cut.x 1 DC Power

More information

The Wireless Network Road Trip

The Wireless Network Road Trip The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in

More information