Improving Security in Wireless Networks
|
|
- Florence Gibbs
- 6 years ago
- Views:
Transcription
1 Improving Security in Wireless Networks Introduction Wireless networking provides many advantages over conventional wired networks. For instance the ability to connect to your network resources without the capital costs of installing structured wiring and the ability to roam within the range of your access points or gateway. It also, however, carries a disadvantage over conventional networking systems in that anyone within range of your access points or gateway while sharing your wireless settings may also connect to your network. To combat this security issue, the IEEE standards body have provided a mechanism to improve the security of wireless connections called Wired Equivalent Privacy (WEP). This document will look at the security measures built-in to wireless networking, such as WEP encryption and MAC address filtering, and other methods of providing more robust security as well as providing a guide to securing the wireless connections to the OfficeConnect Wireless Cable/DSL Gateway. The following text assumes that you have successfully installed a wireless network using the OfficeConnect Wireless Cable/DSL Gateway installation wizard. If you have followed the instructions then you will have one or more PC clients that are able to connect, via the wireless network, to the OfficeConnect Wireless Cable/DSL Gateway. Communications at this level are insecure but there are some steps you can make to improve security on your network.
2 Security Features in Wireless Networking There are a number of features included in wireless networking that can be used to improve the security of the network. These features will not make the wireless network completely secure, but they can substantially improve security. SSID Each wireless network has a name; this is referred to as the SSID (Service Set Identifier) or "Service Area Name". When wireless systems were first installed the SSID was considered to be a security feature, without knowing the name of the network it was difficult to connect to it., however, some wireless NICs now have the ability to scan for available SSIDs and join that group bypassing any security that might have been given by the SSID. This means that anyone can see your network provided they are in range and can also join it if the local network administrator has not taken the appropriate security precautions discussed later in this article. Although having a SSID is essential to setting up and using your wireless network it is not sufficient security for a wireless network. WEP Wired Equivalent Privacy (WEP) secures the link between the access point or gateway and the wireless computers and although not specified as part of the IEEE b standard for wireless networking, almost all wireless equipment comes with WEP encryption built-in to the product to increase security. WEP is an encryption mechanism based upon a static key of either 64 or 128 bits in length, which is used to encrypt the data stream using an RC4 encryption algorithm. It encrypts data between a wireless computer and the access point to improve the security of the connection. (Note: WEP 64bit encryption is commonly called 40/64bit encryption; this is because the user definable key is only 40 bits, but there is a 24 bit static key that is automatically added to it therefore providing a 64bit key.) A WEP key is a string of hexadecimal characters, 40/64bit WEP has 10 characters while 128bit WEP has 26 characters. To be able to use WEP both the wireless gateway or access point and the wireless NIC need to have the same WEP key. This will allow the encryption and decryption of data. However, up to 4 WEP keys can be programmed into a wireless NIC or Gateway, but only one (called the transmit key) will be used for encryption. Different components of the wireless network may have different keys defined as the transmit key, as long as both components have the same keys defined in the same order (1-4) then communication will work. For example, if the Gateway was configured to transmit using encryption key 1 then the wireless NIC that it is transmitting to will use key 1 to decrypt the data. If the NIC is configured to use key 3 to transmit then the Gateway will use key 3 to decrypt the data from the NIC. In this way, the data is encrypted differently in either direction, improving the security of the network. It should however be noted that the weakness with the WEP system is that it has a static key; several studies exist where keys have been cracked where sufficient data has been collected enabling someone to crack into the network. For this reason, higher levels of security have been introduced by some vendors based on dynamic keys. These keys change at regular intervals making it significantly more difficult to crack the keys. There is also further work going on within the IEEE committee to develop more robust encryption schemes. This will be covered in greater depth later in this document. The WEP key can normally be entered in several ways, by manually entering the desired number of hexadecimal characters or by using a passphrase. A passphrase is a string of ASCII characters which will be converted into a hexadecimal string. If the passphrase method
3 is used on wireless equipment from different vendors, ensure that the hexadecimal string created is the same for both this is not always the case. 40/64bit or 128bit WEP? This choice is will be based on the sensitivity of data that is being transmitted over the wireless network and the throughput requirements. 128bit WEP will offer a more secure link between wireless clients and the access point but there will have a slower throughput due to encryption and decryption times while 40/64bit WEP will offer less security but have a higher throughput rate. Whichever level of encryption is chosen it must be ensured that both the gateway or access point and the wireless NIC have the same level specified. If the same level is not specified at both ends then the communication between the NIC and access point will not be possible MAC Address Filtering In addition to using WEP to prevent unauthorised access to your wireless network, it is possible to specify exactly which PCs are allowed to access the network by MAC address. (A MAC address is a unique identifier for every device that connects to your network). This is basically a list of authorised PCs that the gateway or access point uses to control access to the wireless network. If MAC address filtering is used then only the MAC addresses specified by the network administrator will be able to connect to the wireless network yet another obstacle placed in the way of a hacker trying to access the network. The OfficeConnect Wireless Cable/DSL Gateway has a list of all MAC addresses accessing the gateway on the user interface; this can be used to form the basis of a MAC address filtering scheme. However, to find the MAC address of your wireless NIC Windows 2000/XP While using the wireless NIC 1. From the Start Menu go to Programs ->Accessories ->Command Prompt 2. Type ipconfig /all 3. The parameter called Physical Address will have a 12 digit hexadecimal number. This is the MAC address of the Wireless NIC. Windows 95/98/ME While using the wireless NIC 1. From the Start Menu choose Run 2. Type winipcfg 3. Choose the wireless NIC from the pull down menu 4. The parameter called Adapter Address will have a 12 digit hexadecimal number. This is the MAC address of the Wireless NIC. Higher levels of security As previously mentioned, there are methods of further securing the wireless network against hacking although these security features are normally only found in higher end wireless devices, such as the 3Com Access Point 6000 and the 3Com Access Point Dynamic Security Link increases security by using a 128-bit encryption key that is automatically changed for each networking session. This increases security as the key is no longer static (as in WEP) and therefore is harder for a hacker to break. The new keys are negotiated between the wireless client and Access Point so there is no need for a manual key
4 to be entered by the user. User Authentication can also be used for an even higher level of security by requiring users to enter a username and password for each session. Another way to increase security is by using central authentication to validate the log-in details of any user trying to use the wireless network. The most popular way of doing this is by using a central RADIUS server to validate the user details. All user details are stored on the central RADIUS server and the Access Point will authenticate users using the RADIUS server. Each of these features makes the security of the wireless network more secure. Details of both the 3Com Access Point 6000 and 8000 can be found on Virtual Private Networking Another way of further securing the wireless network is by using Virtual Private Networking (VPN) to encrypt data transmission to the private network. In this case, the wireless access point is positioned outside a gateway or router that has the ability to terminate VPNs, so once the connection to the wireless network is made (with or without WEP enabled) then the user will connect to a VPN server to access the private local network using PC based VPN client software. Wireless Network Private Network VPN Terminator/ Firewall Internet Wireless Access Point RADIUS Server (optional) Switch VPN Tunnel By using this scenario the local network is seperated by from the wireless network but is still easily accessed by authorised users. This offers a very high level of security for the local network whilst still protecting unauthorised access to the Internet connection using WEP encryption if enabled. Note: The OfficeConnect Wireless Cable/DSL Gateway cannot be used in this scenario although the 3Com Access Point family can.
5 For more information about VPN technology, refer to the VPN white paper found on
6 How to configure security on the OfficeConnect Wireless Cable/DSL Gateway Security Step 1: Ensure you change your SSID from "101" (3Com OfficeConnect Wireless Cable/DSL Gateway default value) to another set of characters. Currently your product is set up with a default, we strongly recommend that you define a unique name for your wireless network, it is worth considering using an abstract name that does not relate to you or your business, in the same way you might consider any password. You have up to 32 characters that can be used to define the SSID. You will also need to change this in all of your clients. For the time being make a note of your new SSID here. SSID: Security Step 2: Which version of WEP? Currently your system does not have WEP enabled at all, your gateway can support two versions of WEP, the first is referred to as 40 or 64 bit WEP, the second is referred to as 128 bit WEP. The choice of what level of WEP to choose is down to the level of WEP offered by all of your clients. Check your clients to see what they support, some products offer only 40/64 bit WEP, others offer both 40/64 and 128bit WEP. 128bit WEP offers better security than 40/64, but may have an impact on your overall system performance depending on the elements in your system. If you are not sure which key size is best, and your clients can support both, we recommend trying the 128bit key size first and then monitor the network performance. Security Step 3: Enable encryption by selecting either 40/64 bit or 128bit encryption from the pull-down menu. Next select which method of key generation will be used. This selection should be based on the generation methods supported by the wireless clients the same method should be used on the Gateway and the clients. The Gateway offers a number of methods for converting plain text into hex keys. The text is much easier to remember than hex keys but it relies on your wireless adapters also supporting this feature. Different manufacturers have developed different ways of converting plain text and so interoperability is not guaranteed. If you are experiencing difficulty, the Manual Hex Key method is supported by most vendors. The Gateway supports 4 methods to specify the WEP Keys : a) Manual Hex Key This method allows you to manually enter hex keys. Virtually all manufacturers support this scheme. b) 3Com Encryption String This method is only supported by 3Com Wireless products. The string can contain any alpha numeric characters and must be between 6 and 30 characters long. A single string will automatically generate 4 unique keys for 40/64 or 128 bit WEP. c) ASCII This method is supported by some adapter cards running under Windows XP. The string must be exactly 5 characters for 40/64 bit WEP or 13 characters for 128 bit WEP. You must enter a separate string for each of the 4 Keys. You can leave a string blank so long as this Key is not selected as the Active Transmit Key. d) Passphrase This is another common method and similar to the 3Com Encryption string. In 40/64 bit WEP, the Passphrase will generate 4 different keys. However, in 128 bit WEP, this method only generates 1 key which is replicated for all 4 keys.
7 Select the "Active Transmit Key". This selects which of the 4 Keys the Gateway uses when it transmits. You can change the selected key every now and then to increase the security of your network. Make a note of your keys in the table(s) below Key # Active Transmit Key? 1 y/n 2 y/n 3 y/n 4 y/n Key # Active Transmit Key? 1 y/n 2 y/n 3 y/n 4 y/n Hexadecimal characters Hexadecimal characters Security Step 4: The next step is to switch on WEP on all of your clients. Using the information you have collected you will now need to consult the documentation for your client wireless NICs and set up the corresponding information: SSID or Service Area Name, 40/64bit WEP or 128 bit WEP. Remember you have to choose one or the other for your whole network. Finally enter all of the keys you generated on the Gateway in the correct order on each client. If you have a wireless client that only supports one key, ensure you enter the active transmit key as defined in the gateway. While you are making the changes to your clients it would be a good idea to note the MAC addresses for each NIC card you are using. The MAC address is recorded as a sequence of twelve hexadecimal characters. This will be useful if you wish to make further enhancements to the security of your network. Make a note of your Wireless NIC MAC (Media Access Controller) addresses below: Client # Media Access Controller Address PC Name or Owner You may now test the network with encryption enabled. If you encounter any problems go to the trouble shooting section at the end. If you are happy that the encryption settings are working then you can optionally move to the next section for to further enhance security. Security Step 5: The Gateway provides a list of connected PC's, confirm that the PC's on your network that are powered up with a live wireless card can be seen in the list of clients. Verify that all of your clients can still connect to the Gateway. You will need to remember that if MAC address filtering has been enabled, any new device added to the network, or any changes to the existing configuration will need to be recorded in the gateway MAC address table. We also recommend ensuring that you keep the table up to date, accurately reflecting the active devices in your network. Finally, it is also useful to consider that any system using WEP is not unbreakable, therefore regularly changing the keys between the devices is a further precaution you could take.
8 3Com Corporation, Corporate Headquarters, 5400 Bayfront Plaza, Santa Clara, CA To learn more about 3Com solutions, visit 3Com Corporation is publicly traded on Nasdaq under the symbol COMS. The information contained in this document represents the current view of 3Com Corporation on the issues discussed as of the date of publication. Because 3Com must respond to changing market conditions, this paper should not be interpreted to be a commitment on the part of 3Com, and 3Com cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only; 3Com makes no warranties, express or implied, in this document. Copyright Com Corporation. All rights reserved. 3Com is a registered trademark and the 3Com logo is a trademark of 3Com Corporation. Windows NT is a trademark of Microsoft. UNIX is a trademark of UNIX Laboratories. Other company and product names may be trademarks of their respective companies. DMA5119-6CAA01 05/02
Wireless Setup Instructions
Wireless Setup Instructions THESE INSTRUCTIONS ARE VERY IMPORTANT TO SECURE YOUR WIRELESS NETWORK The purpose of this procedure is to "lock" your router so other users can not access your network without
More information5 Tips to Fortify your Wireless Network
Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationFigure 5-25: Setup Wizard s Safe Surfing Screen
4. After the settings have been saved, the Safe Surfing screen will appear. Click the Norton Internet Security Suite button to install the special edition of Norton Internet Security on your computer,
More informationWPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)
WPA SECURITY (Wi-Fi Protected Access) Presentation By Douglas Cheathem (csc 650.01 Spring 2007) OUTLINE Introduction Security Risk Vulnerabilities Prevention Conclusion Live Demo Q & A INTRODUCTION! WPA
More informationA Division of Cisco Systems, Inc. Dual-Band. Wireless A/G g a. User Guide. Game Adapter WIRELESS WGA54AG (EU/LA/UK) Model No.
A Division of Cisco Systems, Inc. Dual-Band 5GHz 2, 4GHz 802.11a 802.11g WIRELESS Wireless A/G Game Adapter User Guide Model No. WGA54AG (EU/LA/UK) Copyright and Trademarks Specifications are subject to
More informationPMS 138 C Moto Black spine width spine width 100% 100%
Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of
More informationOfficeConnect Cable/DSL Gateway Wireless Cable/DSL Gateway User Guide 3C857 3CRWE52196
OfficeConnect Cable/DSL Gateway Wireless Cable/DSL Gateway User Guide 3C857 3CRWE52196 (3CRWE52196 Only) http://www.3com.com/ Part No. DUA0085-5AAA04 Published October 2002 3Com Corporation 5400 Bayfront
More informationTroubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office
Operating System Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office Microsoft Corporation Published: December 2004 Update: May 2005 Abstract Because small office/home
More informationA Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter. User Guide WIRELESS WUSB54G. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter User Guide Model No. WUSB54G Copyright and Trademarks Specifications are subject to change without notice. Linksys
More informationConfiguring Repeater and Standby Access Points
CHAPTER 19 This chapter descibes how to configure your access point as a hot standby unit or as a repeater unit. This chapter contains these sections: Understanding Repeater Access Points, page 19-2 Configuring
More informationWireless Security Guide (for Windows XP, Windows Vista, Windows 7, Mac OSx)
Wireless Security Guide (for Windows XP, Windows Vista, Windows 7, Mac OSx) Wireless Security Guide This guide will take you through the process of configuring, changing or checking the wireless security
More informationWireless Print Server with 3G Mobile Video. Wireless G USB 2.0 Adapter
Wireless G USB 2.0 Adapter Wireless Print Server with 3G Mobile Video System Requirements 10/100 Fast Ethernet Wired or 802.11b/g Wireless Network Printer with USB Port* Computer with: Windows XP (SP2)
More informationNotebook Adapter. Quick Installation Guide WPC300N (EU/LA) Package Contents
Package Contents Wireless-N Notebook Adapter Setup Wizard CD-ROM User Guide (English only) on CD-ROM Quick Installation 24, GHz Wireless-N Notebook Adapter Wireless Model No. WPC300N (EU/LA) Quick Installation
More informationWireless Setup Instructions for Windows
Wireless Setup Instructions for Windows NOTE: For successful wireless setup, you will need to have a network cable for a temporary connection to your wireless router or access point, and you must know
More informationChapter 3 Wireless Configuration
Chapter 3 Wireless Configuration This chapter describes how to configure the wireless features of your WNR854T router. In planning your wireless network, you should consider the level of security required.
More informationBasic Wireless Settings on the CVR100W VPN Router
Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.
More informationWLAN PCMCIA Card. Quick Setup Guide WLC3010
WLAN PCMCIA Card Quick Setup Guide WLC3010 This Quick Set-Up Guide only provides you with the basic instructions for setting up these wireless adaptors on your computer. A complete User Manual that includes
More informationA Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. PCI Adapter WIRELESS. with SpeedBooster WMP54GS (EU/UK/LA) Model No.
A Division of Cisco Systems, Inc. GHz 2,4 802.11g WIRELESS Wireless-G PCI Adapter with SpeedBooster User Guide Model No. WMP54GS (EU/UK/LA) Copyright and Trademarks Specifications are subject to change
More informationZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003
ZyWALL 70 Internet Security Appliance Quick Start Guide Version 3.62 December 2003 Introducing the ZyWALL The ZyWALL 70 is the ideal secure gateway for all data passing between the Internet and the LAN.
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationAmbiCom WL11-SD Wireless LAN SD Card. User Manual
AmbiCom WL11-SD Wireless LAN SD Card User Manual Version 3.0 October 15, 2004 Table of Contents 1 WL11-SD features...3 2 Package Contents & System Requirements...3 2.1 Package Contents... 3 2.2 System
More informationSecurity SSID Selection: Broadcast SSID:
69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will
More informationDigital Entertainment. Networking Made Easy
Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered
More informationA Connect the Broadband Router
A CheckPoint FTS Broadband Linksys WRT54G Router Setup V2 A Connect the Broadband Router PRINT THIS DOCUMENT FOR REFERENCE IMPORTANT: Before you begin, disconnect any computers that are connected to your
More informationSecurity Setup CHAPTER
CHAPTER 8 This chapter describes how to set up your bridge s security features. This chapter contains the following sections: Security Overview, page 8-2 Setting Up WEP, page 8-7 Enabling Additional WEP
More informationMIMO Wireless Broadband Route r User s Manual 1
MIMO Wireless Broadband Router User s Manual 1 Introduction...4 Features...4 Minimum Requirements...4 Package Content...4 Note...4 Get to know the Broadband Router...5 Back Panel...5 Front Panel...6 Setup
More informationLevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver
LevelOne WBR-3407 11g Wireless ADSL VPN Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless ADSL Router Features... 1 Package Contents... 5 Physical Details... 6 CHAPTER
More informationCWA-854HT 54 Mbps Wireless-G High Transmission Access Point User s Guide
CWA-854HT 54 Mbps Wireless-G High Transmission Access Point User s Guide May 2006 Version 1.00 1 Table of Contents Table of Contents... 2 List of Figures... 4 List of Tables... 6 Chapter 1. Introduction...
More informationPacket: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets.
Broadband Setup from A to Z Print out all the info below and get to work...have fun!! A word of caution! It is very important that you SECURE your wireless network using WEP or WPA encryption (password).
More informationWL5041 Router User Manual
TECOM WL5041 Router User Manual TECOM CO., LTD. March 2003 2003 by TECOM CO., LTD. All rights reserved. Printed in Taiwan Table of contents Package Contents--------------------------------------- 2 Installing
More informationWireless LAN Profile Setup
Wireless LAN Profiles, page 1 Network Access Profile Settings, page 2 Wireless LAN Profile Settings, page 3 Wireless LAN Profile Group Settings, page 6 Create Network Access Profile, page 6 Create Wireless
More informationConfiguring Wireless Security Settings on the RV130W
Article ID: 5021 Configuring Wireless Security Settings on the RV130W Objective Wireless networking operates by sending information over radio waves, which can be more vulnerable to intruders than a traditional
More informationWireless Broadband Router
LW6005A-R2 Wireless Broadband Router Manual 1 Introduction... 4 Features... 4 Minimum Requirements... 4 Package Content... 4 Note... 4 Get to know the Broadband Router... 5 Back Panel... 5 Front Panel...
More informationEnGenius Quick Start Guide
T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity
More informationPackage Content IEEE g Wireless LAN USB Adapter... x 1 Product CD-ROM.x 1
IEEE 802.11g Wireless LAN USB Adapter Quick Installation Guide Network Configuration IEEE 802.11g Wireless LAN USB Adapter is a standard USB adapter that fits into any standard USB 2.0 and 1.1 slots in
More informationConfiguring Authentication Types
CHAPTER 11 This chapter describes how to configure authentication types on the access point. This chapter contains these sections: Understanding Authentication Types, page 11-2, page 11-10 Matching Access
More informationWireless Setup Guide Lexmark International, Inc. All rights reserved.
Wireless Setup Guide 2008 Lexmark International, Inc. All rights reserved. Edition notice January 2008 The following paragraph does not apply to any country where such provisions are inconsistent with
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationWireless-N Business Notebook Adapter
Wireless-N Business Notebook Adapter USER GUIDE BUSINESS SERIES Model No. WPC4400N Model Model No. No. Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered
More informationiconnect625w Copyright Disclaimer Enabling Basic Wireless Security
iconnect625w Enabling Basic Wireless Security Copyright Copyright 2006 OPEN Networks Pty Ltd. All rights reserved. The content of this manual is subject to change without notice. The information and messages
More informationOfficeConnect 11g Cable/DSL Router User Guide 3CRWE554G72T 3CRWE554G72TU
OfficeConnect 11g Cable/DSL Router User Guide 3CRWE554G72T 3CRWE554G72TU http://www.3com.com/ Part No. DUA0554-TAAA01 Rev. 01 Published June 2004 3Com Corporation 5500 Bayfront Plaza Santa Clara, California
More informationWhat is Eavedropping?
WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks
More informationWL 5011s g Wireless Network Adapter Client Utility User Guide
WL 5011s 802.11g Wireless Network Adapter Client Utility User Guide 10/2005 1 1. Introduction WL5011s client utility is a clean, straightforward GUI (Graphic User Interface) tool, which is designed for
More informationIntroduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel...
Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel... 4 Front Panel... 5 Setup Diagram... 6 Getting started... 7 Chapter
More informationA Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with SRX 400. User Guide WIRELESS WMP54GX4. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with SRX 400 User Guide Model No. WMP54GX4 Copyright and Trademarks Specifications are subject to change without notice.
More informationWireless-G Broadband Router with SpeedBooster
For DSL users - 1) Make sure you have typed in your user name and password correctly. Some service providers use your full email address as the user name. If you are sure you have enter the right user
More informationD-Link AirPlus G DWL-G700AP
TM D-Link AirPlus G DWL-G700AP 2.4GHz Wireless Access Point Manual Building Networks for People Contents Package Contents...3 Introduction...4 Wireless Basics...6 Getting Started...8 Using the Configuration
More informationRN-111B-EVAL IGRN111B-EVAL 3/10/2009. WiFly evaluation Kit. Features. Description. Getting Started
WiFly evaluation Kit Features Contains all hardware and software components required to configure and setup Roving Networks WiFly 802.11 modules. Supprts Windows based computers via serial or USB interface.
More informationA Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. Access Point WIRELESS WAP54G (EU/LA/UK) Model No.
A Division of Cisco Systems, Inc. GHz 2,4 802.11g WIRELESS Wireless-G Access Point User Guide Model No. WAP54G (EU/LA/UK) Copyright and Trademarks Specifications are subject to change without notice. Linksys
More informationU S E R M A N U A L b/g PC CARD
U S E R M A N U A L 802.11b/g PC CARD Table of Content CHAPTER 1 INTRODUCTION... 1 1.1 WIRELESS LAN FEATURE FUNCTIONS... 1 1.2 REGULATORY NOTICE... 1 1.2.1 FCC Class B Statement...1 1.2.2 Canadian Regulatory
More informationConfiguring the Client Adapter through the Windows XP Operating System
APPENDIX E Configuring the Client Adapter through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in
More informationLiteStation2 LiteStation5 User s Guide
LiteStation2 LiteStation5 User s Guide Contents Contents... 2 Introduction... 3 Quick Setup Guide... 4 Configuration Guide... 8 Main Settings... 9 Link Setup... 10 Basic Wireless Settings... 10 Wireless
More informationProcedure: You can find the problem sheet on the Desktop of the lab PCs.
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Advance Networks Laboratory 907529 Lab.3 WLAN Security Objectives 1. Configure administrator accounts.
More informationLab - View Wireless and Wired NIC Information
Lab - View Wireless and Wired NIC Information Objectives Part 1: Identify and Work with PC NICs Part 2: Identify and Use the System Tray Network Icons Background / Scenario This lab requires you to determine
More informationIntroduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel...
Introduction... 3 Features... 3 Minimum Requirements... 3 Package Content... 3 Note... 3 Get to know the Broadband Router... 4 Back Panel... 4 Front Panel... 5 Setup Diagram... 6 Getting started... 7 Chapter
More informationCompact. Wireless-G g. User Guide. USB Network Adapter with SpeedBooster WIRELESS WUSB54GSC (EU/LA) Model No.
Compact 2.4 GHz 802.11g Wireless-G WIRELESS USB Network Adapter with SpeedBooster User Guide Model No. WUSB54GSC (EU/LA) Copyright and Trademarks Specifications are subject to change without notice. Linksys
More informationWireless Setup Guide (for Windows XP, Windows Vista, Windows 7, Windows 8 and Mac OSx)
Wireless Setup Guide (for Windows XP, Windows Vista, Windows 7, Windows 8 and Mac OSx) Wireless Setup Guide The following steps will take you through the process of setting up and connecting to your wireless
More informationWireless-N. User Guide. USB Network Adapter WUSB300N WIRELESS. Model No.
2.4 GHz WIRELESS Wireless-N USB Network Adapter User Guide Model No. WUSB300N Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More informationWireless-N USB Adapter User s Manual
Wireless-N USB Adapter User s Manual Copyright 2007 EUSSO Technologies, Inc. All rights reserved. Table of Contents PREFACE... 3 WIRELESS LAN BASICS... 3 Warning... 3 INSTALLATION OVERVIEW... 4 INTRODUCTION...
More informationHP Deskjet 6800 series
HP Deskjet 6800 series Network Guide 網路指南 English English Edition 1 May 2004 Copyright 2004 Hewlett-Packard Development Company, L.P. Notice Reproduction, adaptation, or translation without prior written
More informationLearn How to Configure EnGenius Wi-Fi Products for Popular Applications
Learn How to Configure EnGenius Wi-Fi Products for Popular Applications Operation Modes Access Point (AP) / WDS AP Client Bridge (CB) Repeater WDS Bridge Client Router AP Router Access Point An access
More informationHP Photosmart C6100 All-in-One series. Basics Guide
HP Photosmart C6100 All-in-One series Basics Guide HP Photosmart C6100 All-in-One series Basics Guide 2006 Hewlett-Packard Development Company, L.P. Adobe and the Acrobat logo are trademarks of Adobe Systems
More informationConfiguring the Client Adapter through the Windows XP Operating System
APPENDIX E through the Windows XP Operating System This appendix explains how to configure and use the client adapter with Windows XP. The following topics are covered in this appendix: Overview, page
More informationService Managed Gateway TM. Configuring IPSec VPN
Service Managed Gateway TM Configuring IPSec VPN Issue 1.2 Date 12 November 2010 1: Introduction 1 Introduction... 3 1.1 What is a VPN?... 3 1.2 The benefits of an Internet-based VPN... 3 1.3 Tunnelling
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationGHz g. Wireless A+G. User Guide. Notebook Adapter. Dual-Band. Dual-Band WPC55AG a. A Division of Cisco Systems, Inc.
A Division of Cisco Systems, Inc. Dual-Band 5 GHz 802.11a + GHz 2.4 802.11g WIRELESS Dual-Band Wireless A+G Notebook Adapter User Guide Model No. WPC55AG Copyright and Trademarks Specifications are subject
More information802.11N Wireless Broadband Router
802.11N Wireless Broadband Router Pre-N Wireless Access Point Broadband Internet Access WPS 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless Router Features... 1
More informationWireless-G Router User s Guide
Wireless-G Router User s Guide 1 Table of Contents Chapter 1: Introduction Installing Your Router System Requirements Installation Instructions Chapter 2: Preparing Your Network Preparing Your Network
More informationIP806GA/GB Wireless ADSL Router
IP806GA/GB Wireless ADSL Router 802.11g/802.11b Wireless Access Point ADSL Modem NAT Router 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless ADSL Router Features...
More informationWireless LAN Adapter
ANSEL Wireless LAN Adapter 2302-wl360r User s Guide Version 1.1 08/04/2003 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted
More informationVodafone MachineLink. PPTP Configuration Guide
Vodafone MachineLink PPTP Configuration Guide Document history This guide covers the following products: Vodafone MachineLink 3G (NWL-10) Vodafone MachineLink 3G Plus (NWL-12) Vodafone MachineLink 4G (NWL-22)
More informationPackage Contents. D-Link AirPremier TM DWL-3200AP Managed Wireless Access Point. Power over Ethernet base unit. Power Cord. CD-ROM with Manual
System Requirements DWL-3200AP Install Guide System Requirements Minimum System Requirements: CD-ROM Drive Computers with Windows, Macintosh, or Linux-based operating systems Installed Ethernet Adapter
More informationAirCruiser G Wireless Router GN-BR01G
AirCruiser G Wireless Router GN-BR01G User s Guide i Contents Chapter 1 Introduction... 1 Overview...1 Features...1 Package Contents...2 AirCruiser G Wireless Router Rear Panel...2 AirCruiser G Wireless
More informationSecuring Wireless Networks by By Joe Klemencic Mon. Apr
http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies
More informationClick on Close button to close Network Connection Details. You are back to the Local Area Connection Status window.
How to configure EW-7228APn/EW-7416APn as a Repeater to extend wireless range This article can apply on EW-7228APn and EW-7416APn. We used screen shots of EW-7416APn in this instruction. We recommend you
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users Learning Objectives Explain why authentication is a critical aspect of network security Explain
More informationPrestige 660HW Series. Prestige 660H Series. Quick Start Guide
Prestige 660HW Series ADSL 2+ 4-Port Gateway with 802.11g Wireless Prestige 660H Series ADSL 2+ 4-Port Gateway Quick Start Guide Version 3.40 01/2005 Table of Contents Introducing the Prestige... 3 1 Hardware
More informationWireless g AP. User s Manual
Wireless 802.11g AP User s Manual Version 1.8 User s Guide 0 Copyright Statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,
More informationDATA PROJECTOR XJ-H1650/XJ-H1750 XJ-ST145/XJ-ST155
DATA PROJECTOR XJ-H1650/XJ-H1750 XJ-ST145/XJ-ST155 E Data Projector Wireless Function Guide Be sure to read the precautions in the Setup Guide that comes with the Data Projector. Be sure to keep all user
More informationWireless-G. User Guide. PrintServer for USB 2.0. GHz g WPS54GU2. A Division of Cisco Systems, Inc. WIRELESS. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PrintServer for USB 2.0 User Guide Model No. WPS54GU2 Copyright and Trademarks Specifications are subject to change without notice.
More informationipass Open Mobile 1.2 for Mac User Guide
Version 1.0, May 2011 Corporate Headquarters ipass Inc. 3800 Bridge Parkway Redwood Shores, CA 94065 USA www.ipass.com +1 650-232-4100 +1 650-232-0227 fx Copyright 2011, ipass Inc. All rights reserved.
More informationDATA PROJECTOR XJ-H1650/XJ-H1750/XJ-H2650 XJ-ST145/XJ-ST155
DATA PROJECTOR XJ-H1650/XJ-H1750/XJ-H2650 XJ-ST145/XJ-ST155 E Data Projector Wireless Function Guide Be sure to read the precautions in the Quick Start Guide that comes with the Data Projector. Be sure
More informationLinksys EA-Series Routers
Routers Table of Contents Table of Contents Product overview EA2700/EA3500 Back view Bottom view EA4500 Top view Back view Setting Up Your EA-Series Router Where to find more help How to set up your router
More informationA Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. PCI Adapter WIRELESS. with SpeedBooster WMP54GS. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with SpeedBooster User Guide Model No. WMP54GS Copyright and Trademarks Specifications are subject to change without notice.
More informationChapter 1 Introduction
Copyright Statement is the registered trademark of Zonet Technology Inc. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective holders. Copyright
More informationMAC Address Filtering Setup (3G18Wn)
MAC Address Filtering Setup (3G18Wn) MAC Address Filtering MAC address filtering refers to the process of allowing (or denying) access to your wireless network based on the hardware address of the device
More informationREMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc.
REMOTE ACCESS IPSEC Course 4002 1 Remote Access Features! Granular Network Access and Authorization based on groups and policies.! Windows, Linux, and MAC client support. Windows ShrewSoft Client MAC IPSecuritas
More informationKNX Secure. KNX Position Paper on Data Security and Privacy
KNX Secure KNX Position Paper on Data Security and Privacy KNX Secure Position Paper This paper is intended as a guide for both installers as well as KNX manufacturers to learn about the current measures
More informationConfiguring Repeater and Standby Access Points and Workgroup Bridge Mode
CHAPTER 19 Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter descibes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.
More informationTable of Contents. Page ii
Table of Contents Chapter 1 Introduction 1 Features... 1 Safety Instructions... 1 Package Contents... 2 Physical Details... 3 Chapter 2 Setup 5 Overview... 5 Using the Windows Wizard... 5 Chapter 3 Web-Based
More informationA Division of Cisco Systems, Inc. Dual-Band. GHz g a. Dual-Band. Wireless A+G. Access Point. User Guide WIRELESS WAP55AG. Model No.
A Division of Cisco Systems, Inc. Dual-Band 5 GHz 802.11a + GHz 2.4 802.11g WIRELESS Dual-Band Wireless A+G Access Point User Guide Model No. WAP55AG Copyright and Trademarks Specifications are subject
More informationWiSpan Quick Start Guide
Quick Start Guide 2008 Copyright Lantronix is a trademark of Lantronix. All rights reserved. 900-462 Rev. B 06/08 QUICK START CONTENTS What s In the Box..........................................................2
More informationInfoPrint Color 1826 MFP MT(4989)
InfoPrint Color 1826 MFP MT(4989) Wireless Setup Guide G510-7196-00 InfoPrint Color 1826 MFP MT(4989) Wireless Setup Guide G510-7196-00 Edition notice September 2008 The following paragraph does not apply
More informationWireless-G. User Guide. Portable USB Adapter. GHz g WUSB54GP. A Division of Cisco Systems, Inc. WIRELESS. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Portable USB Adapter User Guide Model No. WUSB54GP Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its
More informationTable of Contents. Chapter 1 Product Overview Features Package Contents LED Indicator and Panel Description...
Copyright Statement is the registered trademark of Monoprice. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective holders. Copyright of the
More informationAgile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
V100R002C10 Permission Control Technical White Paper Issue 01 Date 2016-04-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationTable of Contents. Chapter 1Introduction Package Contents Features Specifications Physical Description...
Table of Contents Chapter 1Introduction... 3 1.1 Package Contents... 3 1.2 Features... 3 1.3 Specifications... 3 1.4 Physical Description... 4 Chapter 2Wireless LAN Access Point Connection... 5 Chapter
More informationA Division of Cisco Systems, Inc. Wireless-B b. User Guide. USB Network Adapter WIRELESS WUSB11 (UK/EU/LA) Model No.
A Division of Cisco Systems, Inc. 2,4 GHz 802.11b WIRELESS Wireless-B USB Network Adapter User Guide Model No. WUSB11 (UK/EU/LA) Copyright and Trademarks Specifications are subject to change without notice.
More information