WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC
|
|
- May O’Brien’
- 5 years ago
- Views:
Transcription
1 WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC
2 Agenda Wireless Technology Overview IEEE WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies
3 Wireless Technologies WPAN (Wireless Personal Area Network) Range 1-10 m Device-to-device links WLAN (Wireless Local Area Network) Range < 100 m, Indoor wireless network WMAN & WWAN (Wireless Metropolitan Area Network & Wireless Wide Area Network) Coverage over large areas, e.g., City & rural areas Outdoor wireless network
4 WPAN Range 1-10 m Low power consumption Technologies Infrared (IR Port) needs line of sight Bluetooth non-line of sight Data rate < 2 Mb/s Applications: Phone-to-phone data transfer Wireless headset Remote Control
5 WLAN Range < 100 m Home, office, indoor wireless networks 2.4 GHz: Unlicensed frequency band. Technologies: IEEE (Wi-Fi) Data rate : Mb/s (Bluetooth)
6 WMAN & WWAN Coverage over large areas, e.g. city & rural areas, outdoor wireless networks Typically, ISPs need licensed to operate Technologies: GPRS (GSM), CDMA Data rate < 128 kb/s 3G Cellular Networks Data rate < 2 Mb/s Wi-MAX (IEEE ) Data rate > 2 Mb/s To be commercially available in about 2-3 years Laptop will have built-in Wi-Max devices
7 IEEE Technology Home, office, indoor wireless networks Define Physical layer and MAC layer Wireless Ethernet 2.4 GHz: Unlicensed frequency band. ISM: MHz Data rate < 54 Mb/s Range < 100 m (per base station device)
8 IEEE : CSMA/CA IEEE Ethernet CSMA/CD (Carrier Sense Multiple Access/Collision Detection) Wait for random amount of time after carrier is not busy, before sending data Collision detection by checking for exceeded voltage If collision, restart the process IEEE Wireless Ethernet CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) Collision detection is not possible due to wireless nature Collision avoidance by keeping track of carrier busy schedule When sending data, length of transmission is also broadcasted, so that every one know how long a user will use the medium
9 IEEE Devices Client Devices Notebook WLAN Access Point Desktop PDA 3G phone Antenna
10 History of IEEE WLAN 1997 IEEE Data rate: 1-2 Mb/s 1999 IEEE b Wi-Fi Data rate: 11 Mb/s 2003 IEEE g, Data rate: 54 Mb/s 2004 IEEE i Enhanced Security (2006???) IEEE n Data rate: > 100 Mb/s
11 IEEE : Usable Frequencies GHz (ISM) 11 sub-channels (overlapping) 22 MHz Bandwidth for each channel 3 non-overlapping channels Channel 1 Channel 6 Channel 11
12 Wireless Security Issues Difficult to control signal radiation Difficult (impossible) to know if someone is listening/sniffing Difficult to track location of attackers Antenna can further extend attacking ranges Access point Wireless Hub Data Sniffing Unauthorized Access & Spy Signal Jamming/Interference
13 WLAN Security Threats Data Sniffing Tools: - AiroPeek,Kismet, Username/password User messages Internet chat Credit card Info. Access point Wireless Hub Hacker Invisible Sniffer!
14 WLAN Security Threats Unauthorized Client Access Internet War-Driving Internet attack MAC spoofing User Invisible Hacker
15 WLAN Security Threats Unauthorized/Rogue/Faked Access Points User Spy, Backdoor Man-in-the-Middle Attacks Inverse war-driving Mutual Authentication Issue! Rogue AP Hacker
16 WLAN Security Threats Jamming attack User 2.4 GHz RF jamming Packet flooding RF Jamming cannot be prevented! Hacker
17 How to secure SOHO WLAN? SOHO Small Office Home Office Use shared-key encryption feature of WLAN device every one uses the same share encryption key! WEP (Wired Equivalent Privacy) Ok! But out-of-date now coz it can be cracked! using software like Aircrack & Airsnort WPA-PSK New technology to replace WEP
18 How to Secure Enterprise WLAN? According to computer security principles, we need to address Technology Encryption & authentication People User security awareness Process Security Policy
19 Technology for Enterprise i (WPA) User Database Radius Switch Internet Router/Gateway AP AP
20 WPA & IEEE i WPA = Wi-Fi Protected Access (2003) TKIP (Temporal Key Integrity Protocol) Dynamic WEP per user per packet keying IEEE i (2004) AES or TKIP Authentication & automatic key management via IEEE 802.1x protocol Mutual client/server authentication
21 WPA/IEEE i Requirements WPA/IEEE i Access Points Client Windows XP Windows xx + 3 rd party software (e.g. Funk) (Linux) Authentication Server, e.g. RADIUS Odyssey by Funk (Commercialized) Windows 2000/2003 server (Commercialized) FreeRADIUS (Opensource)
22 Additional Technologies Firewall Treat WLAN as untrusted network Separate WLAN from Intranet Server farm Hub Intranet Firewall AP AP Internet
23 Additional Technologies Virtual AP & VLAN Multiple user groups for one AP Different security policy each group MAC Address Filtering Weak user authentication Hotspot gateway Widely used, e.g, Starbuck & True Wi-Fi User must login in before gaining access No encryption required! VPN User authentication + encryption
24 Solutions VPN Secured tunnel VPN Server Switch Internet Router/Gateway AP AP
25 Research at ThaiCERT/NECTEC Develop user-friendly multi-purpose secure WLAN server WPA/IEEE i support Hotspot gateway RADIUS Firewall VPN services Web-base user interface
26 ThaiCERT Wireless Manager Develop friendly graphic user interface for managing user account Features Add/Edit/Delete user account Generate user certification Status of users Manage RADIUS server
27
28 Solutions Authentication Gateway Commonly used in Wi-Fi hotspot User login is required before access the Internet Opensource Authentication Gateway Goal to create an authentication gateway appliance Develop friendly graphic user interface of gateway management Evaluate the performance
29 Solutions VPN Create secured tunnel to protect wireless communication Opensource VPN Server Goal to create a VPN server appliance Develop friendly graphic user interface of server management Support wide range of VPN solutions (i.e., PPTP, L2TP/IPSec, SSL) Support wide range of VPN clients (i.e., Windows OS, MAC OS, Linux) Evaluate the performance
30 Wireless Security Total Solution WLAN Manager (Radius, MySQL) VPN Server Switch Internet Auth. Gateway AP AP
31 Thank you
Wireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationWhat is Eavedropping?
WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks
More informationWireless Technologies
Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless
More informationWireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS
How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms
More informationD. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.
Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationWireless Networking Basics. Ed Crowley
Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationCWNP PW Wireless #
CWNP PW0-050 Wireless # http://killexams.com/exam-detail/pw0-050 D. WPA-Personal Answer: D QUESTION: 170 Which VPN protocols are supported by SOHO wireless VPN routers for the purpose of securing data
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationWNRT-627. Data Sheet. Europe/ ETSI: 2.412~2.472GHz (13 Channels) Japan/ TELEC: 2.412~2.484GHz (14 Channels) RF Power.
300Mbps 802.11n Wireless Broadband Router Ultra High Speed 802.11n Wireless The WNRT-627 features latest IEEE 802.11n radio with 2T2R MIMO antenna technology to provide improved wireless speed and coverage
More informationFAQ on Cisco Aironet Wireless Security
FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most
More informationWireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved
Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks
More informationThis course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks.
Certified Wireless Network Administrator (CWNA) Course Overview This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks. Course
More informationWireless Router at Home
Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one
More informationEnGenius Quick Start Guide
T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity
More informationWireless Network Security
Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless
More informationIt is the process of sharing data, programs, and information between two or more computers.
1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet
More informationNew Windows build with WLAN access
New Windows build with WLAN access SecRep 24 17-18 May 2016 Ahmed Benallegue/Hassan El Ghouizy/Priyan Ariyansinghe ECMWF network_services@ecmwf.int ECMWF May 19, 2016 Introduction Drivers for the new WLAN
More information1. INTRODUCTION. Wi-Fi 1
Wi-Fi 1 1. INTRODUCTION Wi-Fi, or Wireless Fidelity, is freedom: it allows you to connect to the Internet from your home, a bed in a hotel room or at a conference room at work without wires. How? Wi-Fi
More informationProduct Description. HUAWEI B593s-931 LTE CPE V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date
HUAWEI B593s-931 LTE CPE V200R001 Issue 01 Date 2013-12-19 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel free
More information02/21/08 TDC Branch Offices. Headquarters SOHO. Hot Spots. Home. Wireless LAN. Customer Sites. Convention Centers. Hotel
TDC 363 Introductions to LANs Lecture 7 Wireless LAN 1 Outline WLAN Markets and Business Cases WLAN Standards WLAN Physical Layer WLAN MAC Layer WLAN Security WLAN Design and Deployment 2 The Mobile Environment
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationProduct Description. HUAWEI E5180s-610 LTE cube V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue. Date
HUAWEI E5180s-610 LTE cube V200R001 Issue 01 Date 2014-11-10 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationWireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics Standards Technical Concepts Implementation Troubleshooting 802.11 timeline source: Anandtech
More informationChapter 10: Wireless LAN & VLANs
Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1
More informationExam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]
s@lm@n HP Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] HP HP2-Z32 : Practice Test Question No : 1 What is a proper use for an ingress VLAN in an HP MSM VSC?
More informationInterworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...
Interworking 2006 Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks Interworking Conference, 15th - 17th of January 2007 Dr-Ing Kai-Oliver Detken Business URL: http://wwwdecoitde
More informationFamily Structural Overview
Some IEEE 802 Standards TELE301 Lecture 5 802.11 Wireless Networking David Eyers Telecommunications Programme University of Otago 802.1 Bridging and Management 802.1X,... 802.3 Ethernet 802.11 Wireless
More informationAdvanced Security and Mobile Networks
Advanced Security and Mobile Networks W.Buchanan (1) 9. GSM/3G Unit 7: Mobile Networks. Wireless. Security. Mobile IP. Mobile Agents. Spread spectrum. Military/Emergency Networks 8. Ad-hoc 7. Mobile Networks
More informationLESSON 12: WI FI NETWORKS SECURITY
LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information
More informationChapter 24 Wireless Network Security
Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically
More informationToday s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd.
Today s challenge on Wireless Networking David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd. Agenda How Popular is Wireless Network? Threats Associated with Wireless Networking
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE
More informationWireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.
Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE
More informationBasic Wireless Settings on the CVR100W VPN Router
Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.
More informationWireless networking with three times the speed and five times the flexibility.
Wireless 150N Outdoor Range Extender / Access Point Multiple SSIDs, Wireless client isolation, Bridge, Repeater, WDS, Passive PoE, Built-in 12dBi Antenna Part No.: 525497 Wireless networking with three
More informationNWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012
NWD2705 Dual-Band Wireless N450 USB Adapter Version 1.00 Edition 1, 09/2012 Quick Start Guide User s Guide www.zyxel.com Copyright 2012 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationMulti-Function Gigabit Wireless-N Client Bridge 2.4GHz 300Mbps Client Bridge/AP/ WDS/Repeater
Multi-Function Gigabit Wireless-N Client Bridge 2.4GHz 300Mbps Client Bridge/AP/ WDS/Repeater ECB-9750 ECB-9750 is a powerful and multi-functioned 11n product with 7 major multi-functions, is designed
More informationIn-Building Wireless Networks. Mitchell Shnier Lance Communications
In-Building Wireless Networks Mitchell Shnier Lance Communications Toronto Users Group March 19, 2003 Wireless Local Area Networks Overview motivation and perspective Background history and standards Management
More informationECB N Multi-Function Gigabit Client Bridge
ECB9500 is a powerful and multi-functioned 11n product with 7 major multi-functions, is designed to operate in every working environment for enterprises. ECB9500 is a Wireless Network device that delivers
More informationOverview of IEEE Networks. Timo Smura
Overview of IEEE 802.11 Networks Timo Smura 24.03.2004 Outline Introduction IEEE 802.11 standards Protocol model Network topologies 802.11 MAC layer 802.11 PHY layers Interoperability: Wi-Fi Alliance 3GPP
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationVendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo
Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationPRODUCT DESCRIPTION. Learn more about EnGenius Solutions at
Wireless Long Range Multi-function Client Bridge 2.4 GHz EIRP up to 400mW Access point Client Bridge Repeater Client Router PRODUCT DESCRIPTION is a powerful client bridge. It supports several networking
More informationWIRELESS AS A BUSINESS ENABLER. May 11, 2005 Presented by: Jim Soenksen and Ed Sale, Pivot Group
WIRELESS AS A BUSINESS ENABLER May 11, 2005 Presented by: Jim Soenksen and Ed Sale, Pivot Group Presentation Goals Describe the need for and benefits of Wireless Networking Describe the risks involved
More informationWi-Fi Scanner. Glossary. LizardSystems
Wi-Fi Scanner Glossary LizardSystems 2 Table of Contents 802 6 802.11 6 802.11a 6 802.11b 6 802.11d 6 802.11e 6 802.11g 6 802.11h 6 802.11i 6 802.11j 6 802.11n 7 802.1X 7 802.3 7 A 8 Ad-Hoc mode 8 AES
More informationUsing Mobile Computers Lesson 12
Using Mobile Computers Lesson 12 Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data Use BitLocker Drive Encryption Use remote network connections
More informationVISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks
Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.
More informationWireless LAN, WLAN Security, and VPN
Wireless LAN, WLAN Security, and VPN 麟瑞科技台南辦事處技術經理張晃崚 WLAN & VPN FAQ What is WLAN?802.11a?802.11b?802.11g? Which standard (product) should we use? How to deploy WLAN? How to block intruders? How to authenticate
More informationM a/b/g Outdoor Layer-2 MESH AP
802.11a/b/g Outdoor Layer-2 MESH AP 2.4GHz / 5GHz 802.11 a/b/g MESH PRODUCT DESCRIPTION EnGenius Mesh AP is designed with IEEE802.11a/b/g standards and addressed on providing high performance mesh network.
More informationWireless High power Multi-function AP
Wireless High power Multi-function AP EAP-3660 2.4GHz Super G 108Mbps Access Point/ WDS/Universal Repeater The EAP-3660 is a smoke detector looking Wireless Access Point / Universal Repeater / WDS that
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationWhat is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne
Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.
More informationMobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE
Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE COURSE TITLE WIRELESS TECHNOLOGY SPECIALIST COURSE DURATION 13 Hours of Interactive Training COURSE OVERVIEW This course will teach you
More information3G / n Wireless Portable Router with 3G HSUPA
HOTELWRT-320GS / 802.11n Wireless Portable Router with HSUPA /3.5G Broadband Sharing PLAET Wireless Portable Router, WRT-320GS, is the smallest multifunctional AP/ Router in the market. It is equipped
More informationUnit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1
1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A
More informationTable of Contents. Chapter1 About g Wireless LAN USB Adapter...1
Table of Contents Chapter1 About 802.11g Wireless LAN USB Adapter...1 1-1 Features and Benefits... 1 1-2 Applications... 2 1-3 Product Kit... 3 1-4 About IEEE 802.11g Wireless LAN USB Adapter LED Indicators...
More informationChapter 1 Introduction
Copyright Statement is the registered trademark of Zonet Technology Inc. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective holders. Copyright
More informationTroubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office
Operating System Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office Microsoft Corporation Published: December 2004 Update: May 2005 Abstract Because small office/home
More informationWireless SOHO Router/Bridge 2.4 GHz b/g 54 Mbps
Wireless SOHO Router/Bridge ECB-1220R 2.4 GHz 802.11 b/g 54 Mbps ECB-1220R is a 2.4GHz 802.11b/g broadband Wi-Fi Router with advanced AP/Client Bridge/Repeater functions. So you could implement this crossover
More informationProcedure: You can find the problem sheet on the Desktop of the lab PCs.
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Advance Networks Laboratory 907529 Lab.3 WLAN Security Objectives 1. Configure administrator accounts.
More informationOpen System - No/Null authentication, anyone is able to join. Performed as a two way handshake.
Five components of WLAN Security 1. Data Privacy 1. Privacy is important because transmission occurs over the air in freely licensed bands. The Data can be sniffed by anyone within range. 2. Eavesdropping
More informationNaveen Kumar. 1 Wi-Fi Technology
Naveen Kumar 1 Contents 2 Introduction Need of Purpose History How a Wi-Fi Network Works Topologies & Configurations Applications Wi-Fi Security Advantages & Limitations Innovations Introduction 3 Wireless
More informationConfiguring the Wireless Parameters (CPE and WBS)
Configuring the Wireless Parameters (CPE and WBS) CHAPTERS 1. Configure Basic Wireless Parameters 2. Configure Wireless Client Parameters 3. Configure Wireless AP Parameters 4. Configure Multi-SSID 5.
More informationConfiguring a VAP on the WAP351, WAP131, and WAP371
Article ID: 5072 Configuring a VAP on the WAP351, WAP131, and WAP371 Objective Virtual Access Points (VAPs) segment the wireless LAN into multiple broadcast domains that are the wireless equivalent of
More informationRelease Notes for Avaya WLAN 9100 Access Point Operating System (AOS) Release
WLAN 9100 Release Notes Release Notes for Avaya WLAN 9100 Access Point Operating System (AOS) Release 8.4.3-7312 Avaya Inc - External Distribution PRODUCT: Avaya WLAN 9100 Access Point Operating System
More informationProduct Description. HUAWEI E5186s-22a LTE CPE V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue. Date
HUAWEI E5186s-22a LTE CPE V200R001 Issue 05 Date 2015-07-09 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel
More informationComputer to Network Connection
Computer to Network Connection Network Installation Steps Having a clear understanding of all the steps required to physically building a network improves the success of a project. You may need to install
More informationChapter 3 Wireless Configuration
Chapter 3 Wireless Configuration This chapter describes how to configure the wireless features of your WNR854T router. In planning your wireless network, you should consider the level of security required.
More informationSecure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements
Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users
More informationChapter 1 Describing Regulatory Compliance
[ 2 ] Chapter 1 Describing Regulatory Compliance Failure to secure a WLAN makes it vulnerable to attack. To properly secure your network, you must be able to identify common threats to wireless and know
More informationAppendix E Wireless Networking Basics
Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical
More informationECB1221R. Wireless Long Range Multi-function Client Bridge PRODUCT DESCRIPTION
Wireless Long Range Multi-function Client Bridge 2.4 GHz EIRP up to 400mW Access point Client Bridge Repeater Client Router PRODUCT DESCRIPTION is a powerful client bridge. It supports several networking
More informationCertified Wireless Network Administrator
coursemonster.com/uk Certified Wireless Network Administrator Overview This new market-leading course from us delivers the best in Wireless LAN training, combining the benefits of: Certified Wireless Network
More informationECB3220. Wireless Long Range Multi-function Client Bridge PRODUCT DESCRIPTION. 2.4 GHz EIRP up to 1000mW
Wireless Long Range Multi-function Client Bridge (Access Point/Client Bridge/Repeater/Client Router) 2.4 GHz EIRP up to 1000mW PRODUCT DESCRIPTION is a powerful client bridge. It supports several networking
More informationOutdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0
Outdoor High Power 802.11b/g/n Wireless USB Adapter USER MANUAL 4.0 2012 Contents 1 Introduction... 3 2 Hardware Installation... 4 3 Driver Installation... 6 3.1 Windows XP... 6 3.2 Windows Vista... 9
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationWL 5011s g Wireless Network Adapter Client Utility User Guide
WL 5011s 802.11g Wireless Network Adapter Client Utility User Guide 10/2005 1 1. Introduction WL5011s client utility is a clean, straightforward GUI (Graphic User Interface) tool, which is designed for
More informationChapter 5 Local Area Networks. Computer Concepts 2013
Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section
More informationCisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]
s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers
More informationSAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide
SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide About this guide This Quick Start Guide describes how to install and operate your SAGEM Wi-Fi 11g USB ADAPTER. Please read this manual before you install the
More informationWireless MAXg Technology
Wireless MAXg Technology MAXimizing range, performance, security and simplicity for 802.11g networks Technology Note Wireless technology has undoubtedly become a ubiquitous presence in our computing environment,
More informationECB GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/
Wireless Long Range Multi-function 7+1 AP ECB3500 2.4GHz Super G 108Mbps Access Point/Client Bridge/Repeater/WDS AP/ EIRP up to 2000mW WDS Bridge/Client Router/AP Router ECB3500 is a powerful, enhanced,
More informationDatasheet. Enterprise WiFi System. Models: UAP, UAP-LR, UAP-Pro, UAP-Outdoor, UAP-Outdoor5. Unlimited Indoor/Outdoor AP Scalability in a
Enterprise WiFi System Models: UAP, UAP-LR, UAP-Pro, UAP-Outdoor, UAP-Outdoor5 Unlimited Indoor/Outdoor AP Scalability in a 1 The UniFi Enterprise WiFi System is a scalable enterprise access point solution
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More information802.11g PC Card/USB Wireless Adapter
802.11g PC Card/USB Wireless Adapter User Guide Regulatory Approvals FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of
More informationSecurity of WiFi networks MARCIN TUNIA
Security of WiFi networks MARCIN TUNIA Agenda 1. Wireless standards 2. Hidden network and MAC filtering protection bypassing 3. Encryption independent attacks 4. Attacks on WEP 5. Attacks on WPA/WPA2 6.
More informationKX/3G ADSL2+ ROUTER MAIN FEATURES
The KORTEX 3G/ADSL2+, a dual-wan 3G / ADSL2+ firewall router integrated with the 802.11g wireless access point and 4-port switch, is a cutting-edge networking product for SOHO and office users. Uniquely,
More informationChapter 3.1 Acknowledgment:
Chapter 3.1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts
More informationECB3500 Wireless Long Range Multi-function 7+1 AP 2.4GHz Super G 108Mbps EIRP up to 2000mW
WDS Bridge/Client /AP ECB3500 is a powerful, enhanced, enterprise level product supports 7 multi-functions to operate for every kind of working environment. It supports high transmit output power and high
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationConfiguring Security Solutions
3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Tab,
More informationWL-5420AP. User s Guide
WL-5420AP User s Guide Table of contents INTRODUCTION... 1 About the Operation Modes...2 LED Indicators...5 Solid...5 Ports on the Rear Panel...7 GETTING CONNECTED... 8 WPA AP -CONFIGURATION VIA WEB...
More informationECB3500 Wireless Long Range Multi-function 7+1 AP
Package Contents - 1* Wireless Long range - multi-function 7+1 AP (ECB3500) - 1* 12V/1A Power Adapter - 1* CAT5 UTP Cable - 1* QIG - 1* CD (User s Manual) - 2* 5dBi 2.4GHz Dipole Antennas ECB3500 is a
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationIEEE n Wireless PCI Adapter. User s Manual
IEEE 802.11n Wireless PCI Adapter User s Manual October, 2008 FCC Warning This equipment has been tested and found to comply with the limits for a Class C digital device, pursuant to part 15 of the FCC
More information