Improving Security in Wireless Networks

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Improving Security in Wireless Networks"

Transcription

1 Improving Security in Wireless Networks Introduction Wireless networking provides many advantages over conventional wired networks. For instance the ability to connect to your network resources without the capital costs of installing structured wiring and the ability to roam within the range of your access points or gateway. It also, however, carries a disadvantage over conventional networking systems in that anyone within range of your access points or gateway while sharing your wireless settings may also connect to your network. To combat this security issue, the IEEE standards body have provided a mechanism to improve the security of wireless connections called Wired Equivalent Privacy (WEP). This document will look at the security measures built-in to wireless networking, such as WEP encryption and MAC address filtering, and other methods of providing more robust security as well as providing a guide to securing the wireless connections to the OfficeConnect Wireless Cable/DSL Gateway. The following text assumes that you have successfully installed a wireless network using the OfficeConnect Wireless Cable/DSL Gateway installation wizard. If you have followed the instructions then you will have one or more PC clients that are able to connect, via the wireless network, to the OfficeConnect Wireless Cable/DSL Gateway. Communications at this level are insecure but there are some steps you can make to improve security on your network.

2 Security Features in Wireless Networking There are a number of features included in wireless networking that can be used to improve the security of the network. These features will not make the wireless network completely secure, but they can substantially improve security. SSID Each wireless network has a name; this is referred to as the SSID (Service Set Identifier) or "Service Area Name". When wireless systems were first installed the SSID was considered to be a security feature, without knowing the name of the network it was difficult to connect to it., however, some wireless NICs now have the ability to scan for available SSIDs and join that group bypassing any security that might have been given by the SSID. This means that anyone can see your network provided they are in range and can also join it if the local network administrator has not taken the appropriate security precautions discussed later in this article. Although having a SSID is essential to setting up and using your wireless network it is not sufficient security for a wireless network. WEP Wired Equivalent Privacy (WEP) secures the link between the access point or gateway and the wireless computers and although not specified as part of the IEEE b standard for wireless networking, almost all wireless equipment comes with WEP encryption built-in to the product to increase security. WEP is an encryption mechanism based upon a static key of either 64 or 128 bits in length, which is used to encrypt the data stream using an RC4 encryption algorithm. It encrypts data between a wireless computer and the access point to improve the security of the connection. (Note: WEP 64bit encryption is commonly called 40/64bit encryption; this is because the user definable key is only 40 bits, but there is a 24 bit static key that is automatically added to it therefore providing a 64bit key.) A WEP key is a string of hexadecimal characters, 40/64bit WEP has 10 characters while 128bit WEP has 26 characters. To be able to use WEP both the wireless gateway or access point and the wireless NIC need to have the same WEP key. This will allow the encryption and decryption of data. However, up to 4 WEP keys can be programmed into a wireless NIC or Gateway, but only one (called the transmit key) will be used for encryption. Different components of the wireless network may have different keys defined as the transmit key, as long as both components have the same keys defined in the same order (1-4) then communication will work. For example, if the Gateway was configured to transmit using encryption key 1 then the wireless NIC that it is transmitting to will use key 1 to decrypt the data. If the NIC is configured to use key 3 to transmit then the Gateway will use key 3 to decrypt the data from the NIC. In this way, the data is encrypted differently in either direction, improving the security of the network. It should however be noted that the weakness with the WEP system is that it has a static key; several studies exist where keys have been cracked where sufficient data has been collected enabling someone to crack into the network. For this reason, higher levels of security have been introduced by some vendors based on dynamic keys. These keys change at regular intervals making it significantly more difficult to crack the keys. There is also further work going on within the IEEE committee to develop more robust encryption schemes. This will be covered in greater depth later in this document. The WEP key can normally be entered in several ways, by manually entering the desired number of hexadecimal characters or by using a passphrase. A passphrase is a string of ASCII characters which will be converted into a hexadecimal string. If the passphrase method

3 is used on wireless equipment from different vendors, ensure that the hexadecimal string created is the same for both this is not always the case. 40/64bit or 128bit WEP? This choice is will be based on the sensitivity of data that is being transmitted over the wireless network and the throughput requirements. 128bit WEP will offer a more secure link between wireless clients and the access point but there will have a slower throughput due to encryption and decryption times while 40/64bit WEP will offer less security but have a higher throughput rate. Whichever level of encryption is chosen it must be ensured that both the gateway or access point and the wireless NIC have the same level specified. If the same level is not specified at both ends then the communication between the NIC and access point will not be possible MAC Address Filtering In addition to using WEP to prevent unauthorised access to your wireless network, it is possible to specify exactly which PCs are allowed to access the network by MAC address. (A MAC address is a unique identifier for every device that connects to your network). This is basically a list of authorised PCs that the gateway or access point uses to control access to the wireless network. If MAC address filtering is used then only the MAC addresses specified by the network administrator will be able to connect to the wireless network yet another obstacle placed in the way of a hacker trying to access the network. The OfficeConnect Wireless Cable/DSL Gateway has a list of all MAC addresses accessing the gateway on the user interface; this can be used to form the basis of a MAC address filtering scheme. However, to find the MAC address of your wireless NIC Windows 2000/XP While using the wireless NIC 1. From the Start Menu go to Programs ->Accessories ->Command Prompt 2. Type ipconfig /all 3. The parameter called Physical Address will have a 12 digit hexadecimal number. This is the MAC address of the Wireless NIC. Windows 95/98/ME While using the wireless NIC 1. From the Start Menu choose Run 2. Type winipcfg 3. Choose the wireless NIC from the pull down menu 4. The parameter called Adapter Address will have a 12 digit hexadecimal number. This is the MAC address of the Wireless NIC. Higher levels of security As previously mentioned, there are methods of further securing the wireless network against hacking although these security features are normally only found in higher end wireless devices, such as the 3Com Access Point 6000 and the 3Com Access Point Dynamic Security Link increases security by using a 128-bit encryption key that is automatically changed for each networking session. This increases security as the key is no longer static (as in WEP) and therefore is harder for a hacker to break. The new keys are negotiated between the wireless client and Access Point so there is no need for a manual key

4 to be entered by the user. User Authentication can also be used for an even higher level of security by requiring users to enter a username and password for each session. Another way to increase security is by using central authentication to validate the log-in details of any user trying to use the wireless network. The most popular way of doing this is by using a central RADIUS server to validate the user details. All user details are stored on the central RADIUS server and the Access Point will authenticate users using the RADIUS server. Each of these features makes the security of the wireless network more secure. Details of both the 3Com Access Point 6000 and 8000 can be found on Virtual Private Networking Another way of further securing the wireless network is by using Virtual Private Networking (VPN) to encrypt data transmission to the private network. In this case, the wireless access point is positioned outside a gateway or router that has the ability to terminate VPNs, so once the connection to the wireless network is made (with or without WEP enabled) then the user will connect to a VPN server to access the private local network using PC based VPN client software. Wireless Network Private Network VPN Terminator/ Firewall Internet Wireless Access Point RADIUS Server (optional) Switch VPN Tunnel By using this scenario the local network is seperated by from the wireless network but is still easily accessed by authorised users. This offers a very high level of security for the local network whilst still protecting unauthorised access to the Internet connection using WEP encryption if enabled. Note: The OfficeConnect Wireless Cable/DSL Gateway cannot be used in this scenario although the 3Com Access Point family can.

5 For more information about VPN technology, refer to the VPN white paper found on

6 How to configure security on the OfficeConnect Wireless Cable/DSL Gateway Security Step 1: Ensure you change your SSID from "101" (3Com OfficeConnect Wireless Cable/DSL Gateway default value) to another set of characters. Currently your product is set up with a default, we strongly recommend that you define a unique name for your wireless network, it is worth considering using an abstract name that does not relate to you or your business, in the same way you might consider any password. You have up to 32 characters that can be used to define the SSID. You will also need to change this in all of your clients. For the time being make a note of your new SSID here. SSID: Security Step 2: Which version of WEP? Currently your system does not have WEP enabled at all, your gateway can support two versions of WEP, the first is referred to as 40 or 64 bit WEP, the second is referred to as 128 bit WEP. The choice of what level of WEP to choose is down to the level of WEP offered by all of your clients. Check your clients to see what they support, some products offer only 40/64 bit WEP, others offer both 40/64 and 128bit WEP. 128bit WEP offers better security than 40/64, but may have an impact on your overall system performance depending on the elements in your system. If you are not sure which key size is best, and your clients can support both, we recommend trying the 128bit key size first and then monitor the network performance. Security Step 3: Enable encryption by selecting either 40/64 bit or 128bit encryption from the pull-down menu. Next select which method of key generation will be used. This selection should be based on the generation methods supported by the wireless clients the same method should be used on the Gateway and the clients. The Gateway offers a number of methods for converting plain text into hex keys. The text is much easier to remember than hex keys but it relies on your wireless adapters also supporting this feature. Different manufacturers have developed different ways of converting plain text and so interoperability is not guaranteed. If you are experiencing difficulty, the Manual Hex Key method is supported by most vendors. The Gateway supports 4 methods to specify the WEP Keys : a) Manual Hex Key This method allows you to manually enter hex keys. Virtually all manufacturers support this scheme. b) 3Com Encryption String This method is only supported by 3Com Wireless products. The string can contain any alpha numeric characters and must be between 6 and 30 characters long. A single string will automatically generate 4 unique keys for 40/64 or 128 bit WEP. c) ASCII This method is supported by some adapter cards running under Windows XP. The string must be exactly 5 characters for 40/64 bit WEP or 13 characters for 128 bit WEP. You must enter a separate string for each of the 4 Keys. You can leave a string blank so long as this Key is not selected as the Active Transmit Key. d) Passphrase This is another common method and similar to the 3Com Encryption string. In 40/64 bit WEP, the Passphrase will generate 4 different keys. However, in 128 bit WEP, this method only generates 1 key which is replicated for all 4 keys.

7 Select the "Active Transmit Key". This selects which of the 4 Keys the Gateway uses when it transmits. You can change the selected key every now and then to increase the security of your network. Make a note of your keys in the table(s) below Key # Active Transmit Key? 1 y/n 2 y/n 3 y/n 4 y/n Key # Active Transmit Key? 1 y/n 2 y/n 3 y/n 4 y/n Hexadecimal characters Hexadecimal characters Security Step 4: The next step is to switch on WEP on all of your clients. Using the information you have collected you will now need to consult the documentation for your client wireless NICs and set up the corresponding information: SSID or Service Area Name, 40/64bit WEP or 128 bit WEP. Remember you have to choose one or the other for your whole network. Finally enter all of the keys you generated on the Gateway in the correct order on each client. If you have a wireless client that only supports one key, ensure you enter the active transmit key as defined in the gateway. While you are making the changes to your clients it would be a good idea to note the MAC addresses for each NIC card you are using. The MAC address is recorded as a sequence of twelve hexadecimal characters. This will be useful if you wish to make further enhancements to the security of your network. Make a note of your Wireless NIC MAC (Media Access Controller) addresses below: Client # Media Access Controller Address PC Name or Owner You may now test the network with encryption enabled. If you encounter any problems go to the trouble shooting section at the end. If you are happy that the encryption settings are working then you can optionally move to the next section for to further enhance security. Security Step 5: The Gateway provides a list of connected PC's, confirm that the PC's on your network that are powered up with a live wireless card can be seen in the list of clients. Verify that all of your clients can still connect to the Gateway. You will need to remember that if MAC address filtering has been enabled, any new device added to the network, or any changes to the existing configuration will need to be recorded in the gateway MAC address table. We also recommend ensuring that you keep the table up to date, accurately reflecting the active devices in your network. Finally, it is also useful to consider that any system using WEP is not unbreakable, therefore regularly changing the keys between the devices is a further precaution you could take.

8 3Com Corporation, Corporate Headquarters, 5400 Bayfront Plaza, Santa Clara, CA To learn more about 3Com solutions, visit 3Com Corporation is publicly traded on Nasdaq under the symbol COMS. The information contained in this document represents the current view of 3Com Corporation on the issues discussed as of the date of publication. Because 3Com must respond to changing market conditions, this paper should not be interpreted to be a commitment on the part of 3Com, and 3Com cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only; 3Com makes no warranties, express or implied, in this document. Copyright Com Corporation. All rights reserved. 3Com is a registered trademark and the 3Com logo is a trademark of 3Com Corporation. Windows NT is a trademark of Microsoft. UNIX is a trademark of UNIX Laboratories. Other company and product names may be trademarks of their respective companies. DMA5119-6CAA01 05/02

Wireless Setup Instructions

Wireless Setup Instructions Wireless Setup Instructions THESE INSTRUCTIONS ARE VERY IMPORTANT TO SECURE YOUR WIRELESS NETWORK The purpose of this procedure is to "lock" your router so other users can not access your network without

More information

5 Tips to Fortify your Wireless Network

5 Tips to Fortify your Wireless Network Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Wireless Security Guide (for Windows XP, Windows Vista, Windows 7, Mac OSx)

Wireless Security Guide (for Windows XP, Windows Vista, Windows 7, Mac OSx) Wireless Security Guide (for Windows XP, Windows Vista, Windows 7, Mac OSx) Wireless Security Guide This guide will take you through the process of configuring, changing or checking the wireless security

More information

Figure 5-25: Setup Wizard s Safe Surfing Screen

Figure 5-25: Setup Wizard s Safe Surfing Screen 4. After the settings have been saved, the Safe Surfing screen will appear. Click the Norton Internet Security Suite button to install the special edition of Norton Internet Security on your computer,

More information

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007) WPA SECURITY (Wi-Fi Protected Access) Presentation By Douglas Cheathem (csc 650.01 Spring 2007) OUTLINE Introduction Security Risk Vulnerabilities Prevention Conclusion Live Demo Q & A INTRODUCTION! WPA

More information

OfficeConnect Cable/DSL Gateway Wireless Cable/DSL Gateway User Guide 3C857 3CRWE52196

OfficeConnect Cable/DSL Gateway Wireless Cable/DSL Gateway User Guide 3C857 3CRWE52196 OfficeConnect Cable/DSL Gateway Wireless Cable/DSL Gateway User Guide 3C857 3CRWE52196 (3CRWE52196 Only) http://www.3com.com/ Part No. DUA0085-5AAA04 Published October 2002 3Com Corporation 5400 Bayfront

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

A Division of Cisco Systems, Inc. Dual-Band. Wireless A/G g a. User Guide. Game Adapter WIRELESS WGA54AG (EU/LA/UK) Model No.

A Division of Cisco Systems, Inc. Dual-Band. Wireless A/G g a. User Guide. Game Adapter WIRELESS WGA54AG (EU/LA/UK) Model No. A Division of Cisco Systems, Inc. Dual-Band 5GHz 2, 4GHz 802.11a 802.11g WIRELESS Wireless A/G Game Adapter User Guide Model No. WGA54AG (EU/LA/UK) Copyright and Trademarks Specifications are subject to

More information

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003 ZyWALL 70 Internet Security Appliance Quick Start Guide Version 3.62 December 2003 Introducing the ZyWALL The ZyWALL 70 is the ideal secure gateway for all data passing between the Internet and the LAN.

More information

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter. User Guide WIRELESS WUSB54G. Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter. User Guide WIRELESS WUSB54G. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter User Guide Model No. WUSB54G Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

Configuring Repeater and Standby Access Points

Configuring Repeater and Standby Access Points CHAPTER 19 This chapter descibes how to configure your access point as a hot standby unit or as a repeater unit. This chapter contains these sections: Understanding Repeater Access Points, page 19-2 Configuring

More information

MIMO Wireless Broadband Route r User s Manual 1

MIMO Wireless Broadband Route r User s Manual 1 MIMO Wireless Broadband Router User s Manual 1 Introduction...4 Features...4 Minimum Requirements...4 Package Content...4 Note...4 Get to know the Broadband Router...5 Back Panel...5 Front Panel...6 Setup

More information

Wireless Print Server with 3G Mobile Video. Wireless G USB 2.0 Adapter

Wireless Print Server with 3G Mobile Video. Wireless G USB 2.0 Adapter Wireless G USB 2.0 Adapter Wireless Print Server with 3G Mobile Video System Requirements 10/100 Fast Ethernet Wired or 802.11b/g Wireless Network Printer with USB Port* Computer with: Windows XP (SP2)

More information

Wireless Broadband Router

Wireless Broadband Router LW6005A-R2 Wireless Broadband Router Manual 1 Introduction... 4 Features... 4 Minimum Requirements... 4 Package Content... 4 Note... 4 Get to know the Broadband Router... 5 Back Panel... 5 Front Panel...

More information

Chapter 3 Wireless Configuration

Chapter 3 Wireless Configuration Chapter 3 Wireless Configuration This chapter describes how to configure the wireless features of your WNR854T router. In planning your wireless network, you should consider the level of security required.

More information

Wireless Setup Instructions for Windows

Wireless Setup Instructions for Windows Wireless Setup Instructions for Windows NOTE: For successful wireless setup, you will need to have a network cable for a temporary connection to your wireless router or access point, and you must know

More information

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. PCI Adapter WIRELESS. with SpeedBooster WMP54GS (EU/UK/LA) Model No.

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. PCI Adapter WIRELESS. with SpeedBooster WMP54GS (EU/UK/LA) Model No. A Division of Cisco Systems, Inc. GHz 2,4 802.11g WIRELESS Wireless-G PCI Adapter with SpeedBooster User Guide Model No. WMP54GS (EU/UK/LA) Copyright and Trademarks Specifications are subject to change

More information

EnGenius Quick Start Guide

EnGenius Quick Start Guide T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity

More information

WLAN PCMCIA Card. Quick Setup Guide WLC3010

WLAN PCMCIA Card. Quick Setup Guide WLC3010 WLAN PCMCIA Card Quick Setup Guide WLC3010 This Quick Set-Up Guide only provides you with the basic instructions for setting up these wireless adaptors on your computer. A complete User Manual that includes

More information

Notebook Adapter. Quick Installation Guide WPC300N (EU/LA) Package Contents

Notebook Adapter. Quick Installation Guide WPC300N (EU/LA) Package Contents Package Contents Wireless-N Notebook Adapter Setup Wizard CD-ROM User Guide (English only) on CD-ROM Quick Installation 24, GHz Wireless-N Notebook Adapter Wireless Model No. WPC300N (EU/LA) Quick Installation

More information

Basic Wireless Settings on the CVR100W VPN Router

Basic Wireless Settings on the CVR100W VPN Router Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.

More information

Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office

Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office Operating System Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office Microsoft Corporation Published: December 2004 Update: May 2005 Abstract Because small office/home

More information

OfficeConnect 11g Cable/DSL Router User Guide 3CRWE554G72T 3CRWE554G72TU

OfficeConnect 11g Cable/DSL Router User Guide 3CRWE554G72T 3CRWE554G72TU OfficeConnect 11g Cable/DSL Router User Guide 3CRWE554G72T 3CRWE554G72TU http://www.3com.com/ Part No. DUA0554-TAAA01 Rev. 01 Published June 2004 3Com Corporation 5500 Bayfront Plaza Santa Clara, California

More information

AmbiCom WL11-SD Wireless LAN SD Card. User Manual

AmbiCom WL11-SD Wireless LAN SD Card. User Manual AmbiCom WL11-SD Wireless LAN SD Card User Manual Version 3.0 October 15, 2004 Table of Contents 1 WL11-SD features...3 2 Package Contents & System Requirements...3 2.1 Package Contents... 3 2.2 System

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver LevelOne WBR-3407 11g Wireless ADSL VPN Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless ADSL Router Features... 1 Package Contents... 5 Physical Details... 6 CHAPTER

More information

CWA-854HT 54 Mbps Wireless-G High Transmission Access Point User s Guide

CWA-854HT 54 Mbps Wireless-G High Transmission Access Point User s Guide CWA-854HT 54 Mbps Wireless-G High Transmission Access Point User s Guide May 2006 Version 1.00 1 Table of Contents Table of Contents... 2 List of Figures... 4 List of Tables... 6 Chapter 1. Introduction...

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

A Connect the Broadband Router

A Connect the Broadband Router A CheckPoint FTS Broadband Linksys WRT54G Router Setup V2 A Connect the Broadband Router PRINT THIS DOCUMENT FOR REFERENCE IMPORTANT: Before you begin, disconnect any computers that are connected to your

More information

Digital Entertainment. Networking Made Easy

Digital Entertainment. Networking Made Easy Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered

More information

Security Setup CHAPTER

Security Setup CHAPTER CHAPTER 8 This chapter describes how to set up your bridge s security features. This chapter contains the following sections: Security Overview, page 8-2 Setting Up WEP, page 8-7 Enabling Additional WEP

More information

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets.

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets. Broadband Setup from A to Z Print out all the info below and get to work...have fun!! A word of caution! It is very important that you SECURE your wireless network using WEP or WPA encryption (password).

More information

WL5041 Router User Manual

WL5041 Router User Manual TECOM WL5041 Router User Manual TECOM CO., LTD. March 2003 2003 by TECOM CO., LTD. All rights reserved. Printed in Taiwan Table of contents Package Contents--------------------------------------- 2 Installing

More information

Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel...

Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel... Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel... 4 Front Panel... 5 Setup Diagram... 6 Getting started... 7 Chapter

More information

WL 5011s g Wireless Network Adapter Client Utility User Guide

WL 5011s g Wireless Network Adapter Client Utility User Guide WL 5011s 802.11g Wireless Network Adapter Client Utility User Guide 10/2005 1 1. Introduction WL5011s client utility is a clean, straightforward GUI (Graphic User Interface) tool, which is designed for

More information

RN-111B-EVAL IGRN111B-EVAL 3/10/2009. WiFly evaluation Kit. Features. Description. Getting Started

RN-111B-EVAL IGRN111B-EVAL 3/10/2009. WiFly evaluation Kit. Features. Description. Getting Started WiFly evaluation Kit Features Contains all hardware and software components required to configure and setup Roving Networks WiFly 802.11 modules. Supprts Windows based computers via serial or USB interface.

More information

Configuring Authentication Types

Configuring Authentication Types CHAPTER 11 This chapter describes how to configure authentication types on the access point. This chapter contains these sections: Understanding Authentication Types, page 11-2, page 11-10 Matching Access

More information

Wireless Setup Guide Lexmark International, Inc. All rights reserved.

Wireless Setup Guide Lexmark International, Inc. All rights reserved. Wireless Setup Guide 2008 Lexmark International, Inc. All rights reserved. Edition notice January 2008 The following paragraph does not apply to any country where such provisions are inconsistent with

More information

Configuring Wireless Security Settings on the RV130W

Configuring Wireless Security Settings on the RV130W Article ID: 5021 Configuring Wireless Security Settings on the RV130W Objective Wireless networking operates by sending information over radio waves, which can be more vulnerable to intruders than a traditional

More information

Wireless-N Business Notebook Adapter

Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter USER GUIDE BUSINESS SERIES Model No. WPC4400N Model Model No. No. Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered

More information

Wireless LAN Profile Setup

Wireless LAN Profile Setup Wireless LAN Profiles, page 1 Network Access Profile Settings, page 2 Wireless LAN Profile Settings, page 3 Wireless LAN Profile Group Settings, page 6 Create Network Access Profile, page 6 Create Wireless

More information

Package Content IEEE g Wireless LAN USB Adapter... x 1 Product CD-ROM.x 1

Package Content IEEE g Wireless LAN USB Adapter... x 1 Product CD-ROM.x 1 IEEE 802.11g Wireless LAN USB Adapter Quick Installation Guide Network Configuration IEEE 802.11g Wireless LAN USB Adapter is a standard USB adapter that fits into any standard USB 2.0 and 1.1 slots in

More information

Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel...

Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel... Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel... 4 Front Panel... 5 Setup Diagram... 6 Getting started... 7 Chapter

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

iconnect625w Copyright Disclaimer Enabling Basic Wireless Security

iconnect625w Copyright Disclaimer Enabling Basic Wireless Security iconnect625w Enabling Basic Wireless Security Copyright Copyright 2006 OPEN Networks Pty Ltd. All rights reserved. The content of this manual is subject to change without notice. The information and messages

More information

Wireless-G Broadband Router with SpeedBooster

Wireless-G Broadband Router with SpeedBooster For DSL users - 1) Make sure you have typed in your user name and password correctly. Some service providers use your full email address as the user name. If you are sure you have enter the right user

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

802.11N Wireless Broadband Router

802.11N Wireless Broadband Router 802.11N Wireless Broadband Router Pre-N Wireless Access Point Broadband Internet Access WPS 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless Router Features... 1

More information

Wireless-G Router User s Guide

Wireless-G Router User s Guide Wireless-G Router User s Guide 1 Table of Contents Chapter 1: Introduction Installing Your Router System Requirements Installation Instructions Chapter 2: Preparing Your Network Preparing Your Network

More information

Service Managed Gateway TM. Configuring IPSec VPN

Service Managed Gateway TM. Configuring IPSec VPN Service Managed Gateway TM Configuring IPSec VPN Issue 1.2 Date 12 November 2010 1: Introduction 1 Introduction... 3 1.1 What is a VPN?... 3 1.2 The benefits of an Internet-based VPN... 3 1.3 Tunnelling

More information

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with SRX 400. User Guide WIRELESS WMP54GX4. Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with SRX 400. User Guide WIRELESS WMP54GX4. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with SRX 400 User Guide Model No. WMP54GX4 Copyright and Trademarks Specifications are subject to change without notice.

More information

D-Link AirPlus G DWL-G700AP

D-Link AirPlus G DWL-G700AP TM D-Link AirPlus G DWL-G700AP 2.4GHz Wireless Access Point Manual Building Networks for People Contents Package Contents...3 Introduction...4 Wireless Basics...6 Getting Started...8 Using the Configuration

More information

IP806GA/GB Wireless ADSL Router

IP806GA/GB Wireless ADSL Router IP806GA/GB Wireless ADSL Router 802.11g/802.11b Wireless Access Point ADSL Modem NAT Router 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless ADSL Router Features...

More information

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. Access Point WIRELESS WAP54G (EU/LA/UK) Model No.

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. Access Point WIRELESS WAP54G (EU/LA/UK) Model No. A Division of Cisco Systems, Inc. GHz 2,4 802.11g WIRELESS Wireless-G Access Point User Guide Model No. WAP54G (EU/LA/UK) Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

Vodafone MachineLink. PPTP Configuration Guide

Vodafone MachineLink. PPTP Configuration Guide Vodafone MachineLink PPTP Configuration Guide Document history This guide covers the following products: Vodafone MachineLink 3G (NWL-10) Vodafone MachineLink 3G Plus (NWL-12) Vodafone MachineLink 4G (NWL-22)

More information

U S E R M A N U A L b/g PC CARD

U S E R M A N U A L b/g PC CARD U S E R M A N U A L 802.11b/g PC CARD Table of Content CHAPTER 1 INTRODUCTION... 1 1.1 WIRELESS LAN FEATURE FUNCTIONS... 1 1.2 REGULATORY NOTICE... 1 1.2.1 FCC Class B Statement...1 1.2.2 Canadian Regulatory

More information

LiteStation2 LiteStation5 User s Guide

LiteStation2 LiteStation5 User s Guide LiteStation2 LiteStation5 User s Guide Contents Contents... 2 Introduction... 3 Quick Setup Guide... 4 Configuration Guide... 8 Main Settings... 9 Link Setup... 10 Basic Wireless Settings... 10 Wireless

More information

Package Contents. D-Link AirPremier TM DWL-3200AP Managed Wireless Access Point. Power over Ethernet base unit. Power Cord. CD-ROM with Manual

Package Contents. D-Link AirPremier TM DWL-3200AP Managed Wireless Access Point. Power over Ethernet base unit. Power Cord. CD-ROM with Manual System Requirements DWL-3200AP Install Guide System Requirements Minimum System Requirements: CD-ROM Drive Computers with Windows, Macintosh, or Linux-based operating systems Installed Ethernet Adapter

More information

Configuring the Client Adapter through the Windows XP Operating System

Configuring the Client Adapter through the Windows XP Operating System APPENDIX E Configuring the Client Adapter through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users Learning Objectives Explain why authentication is a critical aspect of network security Explain

More information

Compact. Wireless-G g. User Guide. USB Network Adapter with SpeedBooster WIRELESS WUSB54GSC (EU/LA) Model No.

Compact. Wireless-G g. User Guide. USB Network Adapter with SpeedBooster WIRELESS WUSB54GSC (EU/LA) Model No. Compact 2.4 GHz 802.11g Wireless-G WIRELESS USB Network Adapter with SpeedBooster User Guide Model No. WUSB54GSC (EU/LA) Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

Wireless-G. User Guide. PrintServer for USB 2.0. GHz g WPS54GU2. A Division of Cisco Systems, Inc. WIRELESS. Model No.

Wireless-G. User Guide. PrintServer for USB 2.0. GHz g WPS54GU2. A Division of Cisco Systems, Inc. WIRELESS. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PrintServer for USB 2.0 User Guide Model No. WPS54GU2 Copyright and Trademarks Specifications are subject to change without notice.

More information

ipass Open Mobile 1.2 for Mac User Guide

ipass Open Mobile 1.2 for Mac User Guide Version 1.0, May 2011 Corporate Headquarters ipass Inc. 3800 Bridge Parkway Redwood Shores, CA 94065 USA www.ipass.com +1 650-232-4100 +1 650-232-0227 fx Copyright 2011, ipass Inc. All rights reserved.

More information

HP Deskjet 6800 series

HP Deskjet 6800 series HP Deskjet 6800 series Network Guide 네트워크설명서 English English Edition 1 May 2004 Copyright 2004 Hewlett-Packard Development Company, L.P. Notice Reproduction, adaptation, or translation without prior written

More information

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

Procedure: You can find the problem sheet on the Desktop of the lab PCs. University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Advance Networks Laboratory 907529 Lab.3 WLAN Security Objectives 1. Configure administrator accounts.

More information

MAC Address Filtering Setup (3G18Wn)

MAC Address Filtering Setup (3G18Wn) MAC Address Filtering Setup (3G18Wn) MAC Address Filtering MAC address filtering refers to the process of allowing (or denying) access to your wireless network based on the hardware address of the device

More information

REMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc.

REMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc. REMOTE ACCESS IPSEC Course 4002 1 Remote Access Features! Granular Network Access and Authorization based on groups and policies.! Windows, Linux, and MAC client support. Windows ShrewSoft Client MAC IPSecuritas

More information

HP Photosmart C6100 All-in-One series. Basics Guide

HP Photosmart C6100 All-in-One series. Basics Guide HP Photosmart C6100 All-in-One series Basics Guide HP Photosmart C6100 All-in-One series Basics Guide 2006 Hewlett-Packard Development Company, L.P. Adobe and the Acrobat logo are trademarks of Adobe Systems

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

Wireless-N. User Guide. USB Network Adapter WUSB300N WIRELESS. Model No.

Wireless-N. User Guide. USB Network Adapter WUSB300N WIRELESS. Model No. 2.4 GHz WIRELESS Wireless-N USB Network Adapter User Guide Model No. WUSB300N Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

HP Deskjet 6800 series

HP Deskjet 6800 series HP Deskjet 6800 series Network Guide 網路指南 English English Edition 1 May 2004 Copyright 2004 Hewlett-Packard Development Company, L.P. Notice Reproduction, adaptation, or translation without prior written

More information

GHz g. Wireless A+G. User Guide. Notebook Adapter. Dual-Band. Dual-Band WPC55AG a. A Division of Cisco Systems, Inc.

GHz g. Wireless A+G. User Guide. Notebook Adapter. Dual-Band. Dual-Band WPC55AG a. A Division of Cisco Systems, Inc. A Division of Cisco Systems, Inc. Dual-Band 5 GHz 802.11a + GHz 2.4 802.11g WIRELESS Dual-Band Wireless A+G Notebook Adapter User Guide Model No. WPC55AG Copyright and Trademarks Specifications are subject

More information

Configuring the Client Adapter through the Windows XP Operating System

Configuring the Client Adapter through the Windows XP Operating System APPENDIX E through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in this appendix: Overview, page

More information

Wireless-N USB Adapter User s Manual

Wireless-N USB Adapter User s Manual Wireless-N USB Adapter User s Manual Copyright 2007 EUSSO Technologies, Inc. All rights reserved. Table of Contents PREFACE... 3 WIRELESS LAN BASICS... 3 Warning... 3 INSTALLATION OVERVIEW... 4 INTRODUCTION...

More information

Wireless Setup Guide (for Windows XP, Windows Vista, Windows 7, Windows 8 and Mac OSx)

Wireless Setup Guide (for Windows XP, Windows Vista, Windows 7, Windows 8 and Mac OSx) Wireless Setup Guide (for Windows XP, Windows Vista, Windows 7, Windows 8 and Mac OSx) Wireless Setup Guide The following steps will take you through the process of setting up and connecting to your wireless

More information

AirCruiser G Wireless Router GN-BR01G

AirCruiser G Wireless Router GN-BR01G AirCruiser G Wireless Router GN-BR01G User s Guide i Contents Chapter 1 Introduction... 1 Overview...1 Features...1 Package Contents...2 AirCruiser G Wireless Router Rear Panel...2 AirCruiser G Wireless

More information

Prestige 660HW Series. Prestige 660H Series. Quick Start Guide

Prestige 660HW Series. Prestige 660H Series. Quick Start Guide Prestige 660HW Series ADSL 2+ 4-Port Gateway with 802.11g Wireless Prestige 660H Series ADSL 2+ 4-Port Gateway Quick Start Guide Version 3.40 01/2005 Table of Contents Introducing the Prestige... 3 1 Hardware

More information

Wireless USB Port Multi-Functional Printer Server. Model # AMPS240W. User s Manual. Ver. 1A

Wireless USB Port Multi-Functional Printer Server. Model # AMPS240W. User s Manual. Ver. 1A Wireless USB 2.0 1-Port Multi-Functional Printer Server Model # AMPS240W User s Manual Ver. 1A Table of Contents 1 Introduction...3 1.1 Package Contents... 3 1.2 System Requirements... 3 2 Multi-Functional

More information

How To Make Belkin Wireless Router Password Protected

How To Make Belkin Wireless Router Password Protected How To Make Belkin Wireless Router Password Protected Wi-Fi Protected Access (WPA) is a type of wireless security which is dynamic in nature. This means Guidelines in creating a wireless password or passphrase

More information

Wireless LAN Adapter

Wireless LAN Adapter ANSEL Wireless LAN Adapter 2302-wl360r User s Guide Version 1.1 08/04/2003 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

On the left hand side of the screen, click on Setup Wizard and go through the Wizard.

On the left hand side of the screen, click on Setup Wizard and go through the Wizard. Q: How do I configure the TEW-435/504BRM (b1) to a DSL, PPPoE connection? A: Step 1 Open your web browser and type the IP address of the TEW-435/504BRM in the address bar. The default IP address is 192.168.0.1.

More information

Learn How to Configure EnGenius Wi-Fi Products for Popular Applications

Learn How to Configure EnGenius Wi-Fi Products for Popular Applications Learn How to Configure EnGenius Wi-Fi Products for Popular Applications Operation Modes Access Point (AP) / WDS AP Client Bridge (CB) Repeater WDS Bridge Client Router AP Router Access Point An access

More information

Linksys EA-Series Routers

Linksys EA-Series Routers Routers Table of Contents Table of Contents Product overview EA2700/EA3500 Back view Bottom view EA4500 Top view Back view Setting Up Your EA-Series Router Where to find more help How to set up your router

More information

Wireless g AP. User s Manual

Wireless g AP. User s Manual Wireless 802.11g AP User s Manual Version 1.8 User s Guide 0 Copyright Statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,

More information

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. PCI Adapter WIRELESS. with SpeedBooster WMP54GS. Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. PCI Adapter WIRELESS. with SpeedBooster WMP54GS. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with SpeedBooster User Guide Model No. WMP54GS Copyright and Trademarks Specifications are subject to change without notice.

More information

Wireless G Broadband Travel user manual Model

Wireless G Broadband Travel user manual Model Wireless G Broadband Travel Router user manual Model 523875 INT-523875-UM-0807-03 Thank you for purchasing the INTELLINET NETWORK SOLUTIONS Wireless G Broadband Travel Router, Model 523875. This router

More information

DATA PROJECTOR XJ-H1650/XJ-H1750 XJ-ST145/XJ-ST155

DATA PROJECTOR XJ-H1650/XJ-H1750 XJ-ST145/XJ-ST155 DATA PROJECTOR XJ-H1650/XJ-H1750 XJ-ST145/XJ-ST155 E Data Projector Wireless Function Guide Be sure to read the precautions in the Setup Guide that comes with the Data Projector. Be sure to keep all user

More information