WIRELESS NETWORKING NETWORK SETUP & CONFIGURATION. W i r e l e s s N e t w o r k i n g - P a g e 1



Similar documents
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

2 Setting Up the Hardware for a Wired Ethernet Network Setting Up the Software for an Ethernet Network... 21

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Contents. Section A Networking Basics Learning the Basics Section B Wired Ethernet Networking... 17

9 Simple steps to secure your Wi-Fi Network.

Chapter 3 Safeguarding Your Network

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Chapter 2 Configuring Your Wireless Network and Security Settings

MN-700 Base Station Configuration Guide

Frequently Asked Questions

ALL Mbits Powerline WLAN N Access Point. User s Manual

Network Security Best Practices

NOTICE. All brand and product names are the trademarks of their respective owners. Copyright 2011 All rights reserved.

FREQUENTLY ASKED QUESTIONS: HOMEPLUG

Chapter 15: Advanced Networks

A Division of Cisco Systems, Inc. GHz g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

Setting up a WiFi Network (WLAN)

Go Wireless. Open up new possibilities for work and play

How To Protect A Wireless Lan From A Rogue Access Point

Ralink Utility User Guide/PC/MAC

AC750 WiFi Range Extender

Question How do I access the router s web-based setup page? Answer

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE

Wireless (Select Models Only) User Guide

HomeNet. Gateway User Guide

RingCentral Router Configuration. Basic Start Guide for Administrators

LW310V2 Sweex Wireless 300N Router

How To Set Up A Computer With A Network Connection On A Cdrom 2.5 (For A Pc) Or Ipad (For Mac) On A Pc Or Mac Or Ipa (For Pc) On An Ipad Or Ipro (

Designing AirPort Extreme Networks

BT Business Total Broadband Fibre User Guide

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Preparing the Computers for TCP/IP Networking

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

TE100-P21/TEW-P21G Windows 7 Installation Instruction

DV230 Web Based Configuration Troubleshooting Guide

N600 WiFi USB Adapter

Chapter 2 Wireless Settings and Security

Wireless Router Quick Start Guide Rev. 1.0a Model: WR300NQ

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

DI-634M. Check Your Package Contents. This product can be set up using any current web browser, i.e., Internet Explorer 6 or Netscape Navigator 7.

Mobile Router MR600 User Guide

Chapter 1 Configuring Internet Connectivity

Linksys WAP300N. User Guide

ROCKET HUB QUICK START GUIDE

Figure 1. The Motorola SB4200 cable modem

54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 2.0

Frequently Asked Questions: Home Networking, Wireless Adapters, and Powerline Adapters for the BRAVIA Internet Video Link

English version. LW320/LW321 Sweex Wireless 300N Router. Package Contents. Terminology list

Quick Installation Guide of WLAN Broadband Router

Setting Up Your Wireless Network

N600 Wireless Dual Band Gigabit Router WNDR3700v3 Setup Manual

You may refer the Quick Installation Guide in the package box for more information.

Wireless Network Standard and Guidelines

DSL-2600U. User Manual V 1.0

How to set up a router to share you broadband connection

Quick Installation Guide DAP Wireless N 300 Access Point & Router


Wireless (Select Models Only) User Guide

GWA501 package contains: 1 Wireless-G Broadband Gateway 1 Power Adapter 1 Ethernet Cable 1 Manual CD 1 Quick Start Guide 1 Warranty/Registration Card

SwannEye HD Security Camera Wi-Fi Connections Quick Setup Guide. Welcome! Lets get started.

wireless broadband information

A6210 WiFi USB Adapter ac USB 3.0 Dual Band User Manual

Frequently Asked Questions

Quick Reference Guide

PCI Wireless Compliance with AirTight WIPS

ZyAIR G-2000 Plus g Wireless 4-port Router Quick Start Guide

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR

Student Halls Network. Connection Guide

Configuring Routers and Their Settings

A Division of Cisco Systems, Inc. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL (EU/LA) Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL. Model No.

Quick Start Guide. RV 120W Wireless-N VPN Firewall. Cisco Small Business

Chapter 3: File and Printer Sharing Overview 27 Share Files (photos, MP3s, household files) 30 Use Shared Files and Printers 30

54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 1.8

Implementing Security for Wireless Networks

Chapter 1 Installing the Gateway

Quick Start Guide. Vonage VWR Device

BEC 6200WZL. 4G/LTE Cellular Broadband Router. Quick Start Guide

Wireless Router Setup Manual

BoB TM 4 port wireless VoIP router

Cisco Virtual Office Express

Almond. Quick Setup Guide

Quick Start. Nighthawk X8 AC5300 Tri-Band WiFi Router Model R8500. Package Contents. NETGEAR, Inc. 350 East Plumeria Drive San Jose, CA USA

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

The next generation of knowledge and expertise Wireless Security Basics

USER GUIDE Cisco Small Business

A Guide To Getting Connected

Step-by-Step Secure Wireless for Home / Small Office and Small Organizations

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

IEEE b WLAN PC Card

Table of Contents. P a g e 2

Quick Installation Guide DIR-620. Multifunction Wireless Router Supporting GSM, CDMA, WiMAX with Built-in 4-port Switch

Chapter 4 Customizing Your Network Settings

Linksys Gateway SPA2100-SU Manual

Transcription:

W i r e l e s s N e t w o r k i n g - P a g e 1 WIRELESS NETWORKING NETWORK SETUP & CONFIGURATION Mr. Paul Creed III, Adjunct II Instructor Kent State University Amy Hissom Thursday, May 8, 2008

W i r e l e s s N e t w o r k i n g - P a g e 2 The following research is a compilation of information based on a number of different sources. Each source is listed at the end of the section it is contained in. What Is Wireless Networking? Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. Wireless networking is a more modern alternative to wired networking that relies on copper and/or fiber optic cabling between network devices. A wireless network offers advantages and disadvantages compared to a wired network. Advantages of wireless include mobility and elimination of unsightly cables. Disadvantages of wireless include the potential for radio interference due to weather, other wireless devices, or obstructions like walls. Wireless is rapidly gaining in popularity for both home and business networking. Wireless technology continues to improve, and the cost of wireless products continues to decrease. Popular wireless local area networking (WLAN) products conform to the 802.11 "Wi-Fi" standards. The gear a person needs to build wireless networks include network adapters (NICs), access points (APs), and routers. (Source: Montana) Benefits of Wireless Wireless offers tangible benefits over traditional wired networking. Ever tried to quickly look up a recipe on the Net while cooking in the kitchen? Do the kids need a networked computer in their bedroom for school projects? Have you dreamed of sending email, instant messaging, or playing games while relaxing on your outdoor patio? These are just some of the things wireless can do for you. The following benefits apply to both wired and wireless networking in homes.

W i r e l e s s N e t w o r k i n g - P a g e 3 Network file sharing between computers gives you more flexibility than using floppy drives or Zip drives. Not only can you share photos, music files, and documents, you can also use a home network to save copies of all of your important data on a different computer. Backups are one of the most critical yet overlooked tasks in home networking. Once a home network is in place, it's easy to then set up all of the computers to share a single printer. No longer will you need to bounce from one system or another just to print out an email message. Other computer peripherals can be shared similarly such as network scanners, Web cams, and CD burners. Using a home network, multiple family members can access the Internet simultaneously without having to pay an ISP for multiple accounts. You will notice the Internet connection slows down when several people share it, but broadband Internet can handle the extra load with little trouble. Sharing dial-up Internet connections works, too. Painfully slow sometimes, you will still appreciate having shared dial-up on those occasions you really need it. Many popular home computer games support LAN mode where friends and family can play together, if they have their computers networked. Voices over IP (VoIP) services allow you to make and receive phone calls through your home network across the Internet, saving you money. Newer home entertainment products such as digital video recorders (DVRs) and video game consoles now support either wired or wireless home networking. Having these products integrated into your network enables online Internet gaming, video sharing and other advanced features. Although you can realize these same benefits with a wired home network, you should carefully consider building a wireless home network instead, for computer mobility, no unsightly wires, and the fact that wireless is the future. Notebook computers and other portable devices are

W i r e l e s s N e t w o r k i n g - P a g e 4 much affordable than they were a few years ago. With a mobile computer and wireless home network, you aren't chained to a network cord and can work on the couch, on your porch, or wherever in the house is most convenient at the moment. Businesses can afford to lay cable under their floors or inside walls. But most of us don't have the time or inclination to fuss with this in our home. Unless you own one of the few newer homes pre-wired with network cable, you'll save substantial time and energy avoiding the cabling mess and going wireless. Wireless technology is clearly the future of networking. In building a wireless home network, you'll learn about the technology and be able to teach your friends and relatives. You'll also be better prepared for future advances in network technology coming in the future. (Source: How to Build a Wireless Home Network) Wireless Technology Standards Because there are multiple technology standards for wireless networking, it pays to do your homework before buying any equipment. The most common wireless technology standards include the following: 802.11b: The first widely used wireless networking technology, known as 802.11b (more commonly called Wi-Fi), first debuted almost a decade ago, but is still in use. 802.11g: In 2003, a follow-on version called 802.11g appeared offering greater performance (that is, speed and range) and remains today's most common wireless networking technology. 802.11n: Another improved standard called 802.11n is currently under development and is scheduled to be complete in 2009. But even though the 802.11n standard has yet to be

W i r e l e s s N e t w o r k i n g - P a g e 5 finalized, you can still buy products based on the draft 802.11n standard, which you will be able to upgrade later to the final standard. All of the Wi-Fi variants (802.11b, g and n products) use the same 2.4 GHz radio frequency, and as a result are designed to be compatible with each other, so you can usually use devices based on the different standards within the same wireless network. The catch is that doing so often requires special configuration to accommodate the earlier devices, which in turn can reduce the overall performance of the network. In an ideal scenario you ll want all your wireless devices, the access point, and all wireless-capable computers to be using the same technology standard and to be from the same vendor whenever possible. (Source: Webopedia) Threats to Wireless Network Security Unauthorized users accessing your network and eaves dropping your internal network communications by connecting with your wireless LAN (WLAN) is just one of the threats of a wireless network. There are a variety of threats posed by insecure or improperly secured WLAN s which include Rogue WLAN s, spoofing internal communications, and theft of network resources. Since wireless routers are relatively inexpensive, ambitious users may plug unauthorized equipment into the network whether it is officially sanctioned or not. These are called rogue wireless networks and may be insecure which in turn can pose a risk to the network at large. An attack from outside of the network can usually be identified as such. If an attacker can connect with your WLAN, they can spoof communications that appear to come from internal domains.

W i r e l e s s N e t w o r k i n g - P a g e 6 Users are much more likely to trust and act on spoofed internal communications. Even if an intruder does not attack your computers or compromise your data, they may connect to your WLAN and hijack your network bandwidth to surf the Web. They can leverage the higher bandwidth found on most enterprise networks to download music and video clips, using your precious network resources and impacting network performance for your legitimate users. Understanding Threats and How to Protect Your Network against Them Segmenting your WLAN from the rest of your network will help to protect the internal network from any issues or attacks on the wireless network. To protect the wireless network itself, there are other steps you can take such as wireless encryption and user authentication. These will ensure unauthorized users do not intrude on your WLAN and that your wireless data can not be intercepted. Encrypting wireless data is one of the ways to ensure that unauthorized users don t eavesdrop on your wireless network. WEP (wired equivalent privacy), which is the original encryption method, was found to be fundamentally flawed. To restrict access, it relies on a shared key or password. Anyone who knows the WEP key can join the wireless network. It won t take long for an attacker to access a WEP-encrypted wireless network since there are tools available that can crack a WEP key in minutes. The reason a WEP key can be cracked in minutes is because there was no mechanism built in to WEP to automatically change the key. WEP is insufficient for protecting an enterprise network, but it is better than not using any encryption at all. WPA (Wi-Fi Protect Access) is the next generation of encryption. It is designed to leverage an 802.1X-compliant authentication server, but it can also be run similar to WEP in PSK (Pre-Shared Key) mode. The main improvement from WEP to WPA is the use of TKIP (Temporal Key Integrity Protocol), which dynamically changes the key to prevent the sort

W i r e l e s s N e t w o r k i n g - P a g e 7 of cracking techniques used to break WEP encryption. Even WPA was a band-aid approach though. WPA was an attempt by wireless hardware and software vendors to implement sufficient protection while waiting for the official 802.11i standard. WPA2 is the most current form of encryption. This encryption provides even more complex and secure mechanisms including CCMP, which is based on the AES encryption algorithm. Your WLAN should be set up with at least WPA encryption, and preferably WPA2 encryption to protect wireless data from being intercepted and to prevent unauthorized access to your wireless network. WPA can interface with 802.1X or RADIUS authentication servers to provide a more secure method of controlling access to the WLAN besides just encrypting wireless data. Where WEP, or WPA in PSK mode, allows virtually anonymous access to anyone who has the correct key or password, 802.1X or RADIUS authentication requires users to have valid username and password credentials or a valid certificate to log into the wireless network. Requiring authentication to the WLAN provides increased security by restricting access, but it also provides logging and a forensic trail to investigate if anything suspicious goes on. While a wireless network based on a shared key might log MAC or IP addresses, that information is not very useful when it comes to determining the root cause of a problem. The increased confidentiality and integrity provided are also recommended, if not required, for many security compliance mandates. With WPA / WPA2 and an 802.1X or RADIUS authentication server, organizations can leverage a variety of authentication protocols, such as Kerberos, MS-CHAP (Microsoft Challenge Handshake Authentication Protocol), or TLS (Transport Layer Security), and use an

W i r e l e s s N e t w o r k i n g - P a g e 8 array of credential authentication methods such as usernames / passwords, certificates, biometric authentication, or one-time passwords. Wireless networks can increase efficiency, improve productivity and make networking more cost effective, but if they are not properly implemented they can also be the Achilles heel of your network security and expose your entire organization to compromise. Take the time to understand the risks, and how to secure your wireless network so that your organization can leverage the convenience of wireless connectivity without creating an opportunity for a security breach. (Source: Secure Your Wireless Network) How to Set Up a Wireless Home Network 1. Connect Your Wireless Router Turn off your cable modem and your wired PC. Unplug the Ethernet cable from your cable modem and plug it into one of the four LAN ports on the back of the wireless router. The other end of the cable should remain connected to your PC. Connect a second Ethernet cable between your modem's Ethernet port and the wireless router's WAN port. (The WAN port is separate from the four grouped LAN ports.) Turn on the modem and wait for the status lights to indicate that it's connected to your service provider. This may take up to a minute. Plug in the router. The status lights will blink as it goes through its own diagnostics; this may also take up to a minute. Boot up your wired PC. 2. Configure Your Router Refer to the router's printed quick-start guide, launch your Web browser, and type in the address indicated in the guide. Follow the on-screen setup wizard, which should guide you step by step through the process. Enable your router's security functions. The options will be WEP and

W i r e l e s s N e t w o r k i n g - P a g e 9 WPA. (See page 88 for more information on enabling WPA.) Both will ask you to enter a key. Depending on your router's manufacturer, you may need to go to Advanced Settings to handle this step and the next two. Change the default administrator's password, which is often known to hackers. Change the SSID the name you give your wireless network. Again, hackers know many of the default SSIDs and can use them to join your network. 3. Install a Wireless PCI Card in a Desktop PC Refer to the card manufacturer's quick-start guide. If necessary, run the software installation program. Shut down the PC. Remove the cover. Locate an available PCI slot and remove the corresponding slot cover from the back of the PC. Carefully route the antenna through the open slot in the back of the PC, insert the card in the slot, and secure it. Replace the cover. Turn on the PC. It should recognize and enable the new hardware. Go to the Control Panel, select Network, select Wireless Networking connection. Click on Properties. Click on Wireless Networking tab. Select the wireless networking name (see step 2e above). Click on Configure. Adjust your security settings to match those on your wireless router. 4. Install a Wireless PC Card in a Notebook Pc Many notebooks have built-in wireless cards. If yours doesn't, follow these instructions. Follow steps "a" and "b" in number 3. Plug your wireless PC Card into an available slot on the side of your notebook. Follow steps "f" and "g" in number 3. (Source: PC Magazine)

W i r e l e s s N e t w o r k i n g - P a g e 10

W i r e l e s s N e t w o r k i n g - P a g e 11 (Source: PBS Free Tips and Tricks and Tech Info)

W i r e l e s s N e t w o r k i n g - P a g e 12 Bibliography Your Guide to Wireless Networking, Bradley Mitchell; About.com; Retrieved: March 29, 2008 Secure Your Wireless Network; From Tony Bradley, CISSP-ISSAP, Your Guide to Internet / Network Security, http://netsecurity.about.com/od/secureyourwifinetwork/a/securewifi.htm, Retrieved on April 29, 2008 Montana Internet Help and Tools; Blackfoot Telecommunications Group, Glossary of Terms: https://www.blackfoot.com/montana-communications.php#w, Retrieved on March 25, 2008. How to Build a Wireless Home Network Tutorial; Bradley Mitchell; http://compnetworking.about.com/cs/wirelessproducts/a/howtobuildwlan.htm; Retrieved: March 29, 2008 Webopedia: The #1 Online Encyclopedia Dedicated to Computer Technology, How Wireless Networks Work; http://www.webopedia.com/didyouknow/computer_science/2008/wireless_networks_explaine d.asp, Retrieved on April 29, 2008 PBS Free Tips and Tricks and Tech Info; http://www.pbshawaii.com/wirelessathome.jpg, Retrieved on April 29, 2008 PC Magazine; How to Set Up a Wireless Home Network, http://www.pcmag.com/article2/0,2817,1277381,00.asp; Retrieved on April 29, 2008