Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Similar documents
WLAN Authentication and Data Privacy

Question How do I access the router s web-based setup page? Answer

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Setting up a WiFi Network (WLAN)

Chapter 3 Safeguarding Your Network

9 Simple steps to secure your Wi-Fi Network.

Chapter 2 Configuring Your Wireless Network and Security Settings

How To Secure A Wireless Network With A Wireless Device (Mb8000)

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

CONNECTING THE RASPBERRY PI TO A NETWORK

STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address

USER GUIDE Cisco Small Business

Customer Installation Guide NBG-4615 v2 ZyXEL Wireless Router

Chapter 2 Wireless Settings and Security

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

ALL Mbits Powerline WLAN N Access Point. User s Manual

Using LAN Wi-Fi (WLAN) 3-2 Connecting Wi-Fi Devices via Wi-Fi (WLAN) 3-3 Connecting Windows 3-5 Connecting Mac 3-8

Installing Your WiFi capable imageclass Product to Your Network for the First Time

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations :

The next generation of knowledge and expertise Wireless Security Basics

TL-WA601G 108M Wireless Access Point

A Division of Cisco Systems, Inc. GHz g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

DV230 Web Based Configuration Troubleshooting Guide

STEP III: Enable the Wireless Network Card

Configuring Your Network s Security

Wi-Fi Settings Guide. Model No. SP 212/SP 213 Series

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.

Table of Contents. Wireless Security...40 What is WEP?...40 Configure WEP...41 What is WPA?...42 Configure WPA-PSK (Personal)

DATA PROJECTOR XJ-A135/XJ-A145/XJ-A235/ XJ-A245

CONCEPTRONIC C54BRS4A g Wireless Broadband Router

How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA

NBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012

TL-WA601G 108M Wireless Access Point

Setting Up Your Wireless Network

TL-WA801ND 300Mbps Wireless N Access Point

HP M n Access Point Configuration and Administration Guide


DATA PROJECTOR XJ-A146/XJ-A246/XJ-A256

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

TL-WA701ND 150Mbps Wireless Lite N Access Point

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

IEEE a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. Software Release v

N450 Wireless Router WNR2500

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter. User Guide WIRELESS WMP54G. Model No.

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

300Mbps Wireless Access Point W301A. User Guide

Cable Modem/Router with Wireless-N

MN-700 Base Station Configuration Guide

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

W301A 300Mbps Wireless Access Point User Guide

Cable Modem/Router with Wireless-N

Huawei WLAN Authentication and Encryption

Wireless LAN Access Point. IEEE g 54Mbps. User s Manual

N300 Wireless Router WNR2000v4 User Manual

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

N600 WiFi USB Adapter

The Importance of Wireless Security

Configuring the WT-4 for ftp (Infrastructure Mode)

Abstract. Avaya Solution & Interoperability Test Lab

Wireless Encryption Protection

FD Wi-Fi Terminals. FD100 Ti /200 Ti /300 Ti Quick set-up Guide

Ralink Utility User Guide/PC/MAC

TRENDnet User s Guide. Cover Page

Nokia E90 Communicator Using WLAN

Wireless Cable Gateway CG3100Dv3

IEEE A/G Access Point

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

How to Set Up a Wireless Router in a Dorm

How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?

TL-WA830RE 300Mbps Wireless N Range Extender

Securing your Linksys Wireless Router BEFW11S4 Abstract

A Division of Cisco Systems, Inc. Wireless A/G. USB Network Adapter. User Guide WIRELESS WUSB54AG. Model No.

TL-WA5210G 2.4GHz High Power Wireless Outdoor CPE

Securing your Linksys WRT54G

NETWORK USER S GUIDE. Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server

Configuring Your Network s Security

A Division of Cisco Systems, Inc. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL (EU/LA) Model No.

N300 WiFi Range Extender WN2000RPT User Manual

User s Manual. Wireless LAN Access Point. Model No.: SP918GK

User Manual DIR-632. Multifunction Wireless Router Supporting WiMAX, 3G GSM/CDMA with Built-in 8-port Switch

VigorAP 800 User s Guide

Click Main on the left hand side then click on Password at the top of the page.

Cable Modem/Router. Cable Modem plus Dual-band Wireless-AC Router

Golden N Wireless Mini USB Adapter. Model # AWLL6075 User s Manual. Rev. 1.2

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

Manual Wireless Extender Setup Instructions. Before you start, there are two things you will need. 1. Laptop computer 2. Router s security key

AP-90M INSTRUCTION MANUAL WIRELESS ACCESS POINT INTRODUCTION 1 BEFORE USING THE AP-90M 2 INSTALLATION GUIDE 3 CONNECTING WIRELESS LAN [BASIC]

Transcription:

IMPORTANT! This Guide refers to the following Products: Securing Your Wireless Network Please read the following carefully; Synopsis: This Guide is designed to help you if you have a Wireless Network that has not yet been secured by means of Encryption. Encrypting your Wireless Network helps to protect it from unwanted use by others. All Belkin Routers There are various methods of encryption and this guide will attempt to explain to you the differences plus guide you through the steps necessary to configure each of them. The Guide will try to remain as general as possible so as to apply to a wide range of Wireless Products. Requirements: All Belkin Modem Routers To complete the steps for configuring Encryption as outlined in this Guide you will need a combination of the following equipment; A Wireless Router, Modem Router or Access Point acting as a central Wireless device in an Infrastructure Network* All Belkin Access Points At least one Wireless Client Adapter to connect to your central Wireless Infrastructure device*. * If an Ad Hoc Network is being created between multiple Client Adapters then one of the Adapters will be configured to Broadcast an SSID and this should be treated as the central Wireless Device. TSG-UK-1-001 TSG-UK-1-009 www.belkin.com Page 1 of 15

Securing Your Wireless Network What is WEP Encryption? Wired Equivalent Privacy or WEP is the original method devised for securing Wireless Networks. WEP uses a method by which all packets of information that are sent wirelessly are encrypted using a set Key. The length of this Key varies depending on whether 64-bit or 128-bit WEP Encryption is used and whether the Key is in ASCII or Hexadecimal format. 64-bit Hexadecimal - 10 Characters long (using letters A-F and Numbers 0-9) 64-bit ASCII - 5 Characters long 128-bit Hexadecimal - 26 Characters long (using letters A-F and Numbers 0-9) 128-bit ASCII - 13 Characters long 64-bit and 128-bit are technically the Algorithms used for the Encryption rather than the key length. Other Manufacturers often refer to the WEP Encryption types by the Key- Length which is 40-bit (64-bit) and 104-bit (128-bit) so don t be worried if the Client Adapter in your PC refers to the Encryption in this way. Some Client Adapters also refer to WEP-Encryption as either Open or Shared. If Both Router or Access Point and Client Adapter have the same WEP-Key that is manually entered then the type is Shared. Generally speaking all Wireless Networking Products old and new support WEP- Encryption so it is often the most widely implemented method. WEP Encryption is however the least secure of all Encryption types and the one that we would recommend the least. The WEP Key is a static one and as such Wireless Packets can be captured by a determined Hacker using widely available Software Applications and cracked to reveal the key being used. TSG-UK-1-001 TSG-UK-1-009 www.belkin.com Page 12 of 15

Securing Your Wireless Network Configuring WEP Encryption To configure WEP-Encryption you will need to login to the User Interface of your (Modem) Router or Access Point via your Internet Browser. Once you have successfully logged into your device you should locate the Menu Heading Wireless and select from its sub-menu the option for Encryption or Security. WEP can then be selected as your chosen method. Regardless of whether you choose 64-bit or 128-bit the method for implementation is the same. Most Belkin (Modem) Routers and Access Points mostly use the Hexadecimal Encryption Key type. The Key can either be entered manually using letters A-F and numbers 0-9 or it can be generated for you simply by typing in a Passphrase and clicking the Generate button. Once you have enabled encryption you should take note of the Key that is being used as this will be required for any and all wireless devices that you wish to use within your encrypted network. TSG-UK-1-009 TSG-UK-1-001 www.belkin.com Page 31 of 51

Securing Your Wireless Network What is WPA Encryption? Wi-Fi Protected Access (WPA) is a data encryption specification created by the WiFi Alliance for 802.11 Wireless Networks that replaces the weaker WEP. It improves on WEP by using Dynamic Encryption Keys as opposed to Static ones to secure Network Access. There is now a WPA2 Standard as well that goes a step further than standard WPA. WPA uses two Encryption methods AES and TKIP. Strictly speaking TKIP falls under WPA and AES falls under WPA2. Here is a summary of each; TKIP TKIP or Temporal Key Integrity Protocol is essentially an enhancement to WEP security. TKIP enhances WEP by adding a 128-bit per-packet key mixing function to strengthen the previously weak WEP Keys, and a re-keying mechanism to provide fresh encryption and integrity keys. This makes TKIP Keys more resistant to hacker attempts. TKIP is that encryption method officially used by the WPA standard. AES AES or Advanced Encryption Standard is the name for the Rijndael Algorithm that was approved to succeed the US Data Encryption Standard (DES). AES unlike TKIP is not bound to the old Hardware and so only newer Wireless devices will support it. AES uses a 256-bit Dynamic Key mechanism but is much faster than WEP or TKIP. AES is that encryption method officially used by the WPA2 standard. WPA is designed for use with an IEEE 802.1X Authentication Server, or Radius Server, which distributes different keys to each user. It can however also be used in Pre-Shared Key or PSK mode, where every Wireless Device is given the same Passphrase. The Passphrase may be from 8 to 63 characters long and can include spaces. This makes the WPA-PSK method an easy one for Home-Users to implement. The Passphrase for authentication stays the same for the Customer, but with WPA the Encryption Key is rotated (changed) randomly behind the scenes. TSG-UK-1-001 TSG-UK-1-009 www.belkin.com Page 14 of 15

Securing Your Wireless Network Configuring WPA Encryption To configure WPA-Encryption you will need to login to the User Interface of your (Modem) Router or Access Point via your Internet Browser. Once you have successfully logged into your device you should locate the Menu Heading Wireless and select from its sub-menu the option for Encryption or Security. WEP can then be selected as your chosen method. Regardless of whether you choose WPA or WPA2, TKIP or AES the method for implementation of the Pre-Shared Key (PSK) method is the same. The Key is entered by simply by typing in a Passphrase or Pre-Shared Key. This is any standard word or phrase that may contain spaces. It has to be between 8 and 63 characters long. Once entered you should simply click on the Apply Changes button. Once you have enabled WPA PSK encryption as above you should take note of the Passphrase or PSK that was used as this will be required for any and all wireless devices that you wish to use within your encrypted network. The WPA/WPA2 Radius Server method is not generally used for Home Environments so that method will not be dealt with as part of this guide. We would recommend WPA/WPA2-PSK as a preferred Encryption Method. TSG-UK-1-001 TSG-UK-1-009 www.belkin.com Page 15 of 15