Underground Networks. Tony Fortunato Sr Network Performance Specialist. The Technology Firm The Technology Firm

Size: px
Start display at page:

Download "Underground Networks. Tony Fortunato Sr Network Performance Specialist. The Technology Firm The Technology Firm"

Transcription

1 Underground Networks Tony Fortunato Sr Network Performance Specialist The Technology Firm 2013 The Technology Firm

2 A bit About Me Tony Fortunato Teaching Wireshark classes since 2000 and with Wireshark University since its inception Started career designing, implementing and troubleshooting financial networks in 1989 such as trading floors and banks. Have been working with outdoor wireless for the past 10 years; 900 Mhz, 2.4 and 5 Ghz. Use commercial and open source tools for troubleshooting and customer knowledge transfer or mentoring services. Provide onsite customized training, mentoring, design, troubleshooting and training services. Certified Fluke Network Instructor and Consultant. Certified Wireshark University Instructor. I do not sell, or resell any of the products I use or mention. 2

3 Perception Versus Reality Perception Things are locked up tight. You think your security and IT policies result in an air-tight, secure environment that protects the corporation. 3

4 Perception Versus Reality Reality No system is bullet-proof. The effectiveness of any system relies on knowing and monitoring where your holes or possible exposures lie. 4

5 Levels Of Network/Security Issues Client Your users create a network or security exposure in an attempt to solve their network access requirements. IT Department Your IT staff installs a temporary network or solution that becomes permanent or causes temporary exposure since it doesn t conform to current security practices or policies. Unfortunately technology has made it easier to build wireless networks. 5

6 EDUCATION There is NO substitute for educating your clients/users. A corporate policy, document or general information should be available to inform users about security and general internet safety. When people understand the existing policies in place, they are more apt to comply and educate their coworkers. The consequences need to be clearly explained and defined as well. 6

7 EDUCATION Security needs to be a part of the corporate culture. Policies should be concise and specific detailing what users can and can t do. An example of a Wireless security policy can be found at SANS.org or specifically: 7

8 Bring Your Own Device (BYOD) With the proliferation of tablets, ebook readers, smartphones, netbooks and laptops, more companies are being asked to allow employees to bring their own devices into the office. I suggest you treat this situation the same way in which you would treat an employee bringing a guest in. For example: Would you allow an employee s guest to connect to the corporate wired network? Would you give a guest your building pass to roam around with. Create separate Wifi or Wired guest networks from your corporate network. Be careful of laptops wired to the corporate network and Wifi to the BYOD network. 8

9 Client and Remote Network Access Many corporations have remote access solutions for their staff. Technology today has unfortunately made it easier for users to circumvent security policies. Teamviewer, Gotomypc, VNC and Logmein provides users remote access to their work computers and in turn, the corporate network. Hamachi can create a VPN network connection to a computer which can act as a gateway to the corporate network directly. Ensure that users either can not access these sites, block these specific port numbers or limit what clients can install on their computer. 9

10 Cellular Sticks These USB or Bluetooth adapters connect devices directly to the internet. Another complicated situation since the computer might be property of the corporation, but not the stick. Secondly, the computer may access the internet via the stick while connected to the corporate network. PC global policies and third party software can be used to control this. 10

11 Physical Rogue Access Points Scenario: A client wants to have wireless coverage in a meeting room or use their personal tablet at work, so they simply connect an Access Point to their network drop. Unfortunately if you do not have an official wireless deployment, you are more susceptible to this going unnoticed since you won t be monitoring for Rogue Access Points. Switch Port Security, Cisco Network Access/Cisco TrustSec, 802.1x, Wifi Scanners, Netstumbler,, AirMagnet Enterprise, Fluke Network Aircheck, Airwave or WiFi IDS can help as well as Vendors Rogue AP detection settings. Cisco s Port security with the mac-address sticky option and max 1 is a good start as well. 11

12 Physical Rogue Access Points Example of travel AP USB powered Extremely small Can be easily mistaken for a USB hard drive sitting on your desk 12

13 Physical Rogue Access Points This one can easily pass for a usb phone charger Switch on the top has the following options; Router/AP, Repeater, WiFi Hotspot 13

14 Fluke Networks AirCheck Hidden AP 14

15 AirMagnet WiFi Analyzer It is important to find a tool that will alert you when a rogue appears.

16 INSSIDER 16

17 Now To Check Manually From MS cmd line C:\>netsh wlan show networks mode=bssid Interface name : Wireless Network Connection There are 4 networks currently visible. SSID 1 : tomwep Network type : Infrastructure Authentication : Open Encryption : WEP BSSID 1 : 00:1a:e3:03:6d:60 Signal : 100% Radio type : g Channel : 10 Basic rates (Mbps) : Other rates (Mbps) : C:\>netsh wlan show networks find "SSID" SSID 1 : tomwep SSID 2 : 24ghzs SSID 3 : waters SSID 4 : 24ghz SSID 2 : 24ghzs Network type : Infrastructure Authentication : WPA2-Personal Encryption : CCMP BSSID 1 : 00:1a:a2:dd:7f:90 Signal : 81% Radio type : g Channel : 1 Basic rates (Mbps) : 1 Other rates (Mbps) :

18 Software Rogue Access Points There are applications that users can install on their computer to share their network connection. This is becoming more common for tablet users who want to use their tablets at work. Examples: Connectify and Intel MyFi. Proper software installation protocols must be in place to prevent or limit what applications can be installed. 18

19 Software Rogue Access Points Connectify features 19

20 Portable Software Based Access Point Virtual Router Simplicity is a simple and stable virtual router software. It requires zero configuration to create a virtual WiFi spot. Portable application 20

21 Smartphone Hotspots Today s cell phone can be configured as a hotspot, so other WiFi devices can get internet access and basically use the phone as a WiFi to Cell modem. This creates a new challenge since a laptop connected to the corporate wired network, might have a WiFi connection to the internet. Monitoring for Rogue AP s and limiting which WiFi networks users can connect to would help. 21

22 Smartphone Hotspots & Tethering Android Hotspot Apple Hotspot 22

23 Other Issues You also have to think of various scenarios, for example what happens if someone claims they got a virus while on your network? Create separate Wifi or Wired guest networks from your corporate network. Guest networks should have its content filtered as well as a notification to the user when the connect to it. Be careful of laptops wired to the corporate network and Wifi to the BYOD network. 23

24 Accessing Non Corporate WiFi 24

25 Accessing Non Corporate WiFi Employees might access nearby non-corporate WiFi networks. Big concern, since the computer is probably wired into the corporate network while simultaneously accessing the Internet via WiFi. PC policies or products like Wireless Autoswitch or BridgeChecker will disable wireless when a hard wired connection is active. 25

26 Tethering Smartphones allow tethering where you use the phone as a modem to access the internet. This one is challenging since the phone might be the employee s phone, but the computer might be the corporations. PC configuration changes and promoting corporate policies. 26

27 Virtual Machines Virtual Machine applications like Vbox, Vmware and Virtual PC can be used to create a virtual PC that doesn t conform to your current PC security or configuration policies. Current software installation policies can be used to block unauthorized applications such as this. 27

28 Live CD & Live USB A Live CD or USB is a complete bootable computer operating system which runs in memory. When you boot from a LIVE CD/USB, the computer is not bound by any of the current login mechanisms that are in place. Configuring computers to only boot from the hard drive and password protecting BIOS settings. Another example where user education can help prevent this. 28

29 Live CD & Live USB Examples Backtrack 29

30 Powerline This technology allows you to send an Ethernet signal through your power/wiring. Used when a temporary network is created and no wired network connections are available and wireless is not an option. Powerline networks should be treated the same as a wireless network and configured with authentication and encryption if used in production. 30

31 Powerline Example With Integrated AP 31

32 Using Anonymous Proxies There are online, browser add-ons and separate applications that clients can use to visit websites which may be blocked by your current policy or system. Examples of these sites/applications are: zend2, hotspot shield, proxify. These online sites should be added to your blocked sites. Current software management practices should prevent this. 32

33 Name Resolution Services These services provide name resolution so people can access their home network when they don t have a statically assigned IP address. Examples of these sites/applications are: TZO, DYNDNS, no-ip. These sites should be added to your list of blocked sites. 33

34 Special Projects or Temporary Networks I sarcastically comment that temporary networks results in 2 things: They eventually become permanent or forgotten. They may be installed without the same measures and policies as the rest of the organization. Temporary or project networks should have a definite expiry or decommission date. If a project network requires internet access different from the corporate users, or accessed by external staff, it should be setup as a separate network. 34

35 Vigilance IT staff must be constantly testing new products and applications to ensure that the low hanging fruit of technology isn t deployed by unauthorized staff. For example: When a new remote application is available, staff should ensure that their current network isn t vulnerable. Time must be dedicated to inform users what they can and can t do. For example: Make it clear that remote access to your computer is forbidden. Correspondence to employees identifying current security issues should be in place. For example: Current viruses, malware, phishing scams, etc. 35

36 Other Tips Some Access Points/Routers will decrease the IP TTL by one. If you capture packets an know when the IP TTL is supposed to be and its one lower, you might suspect a AP is forwarding the packets. The AP MAC address may be in the source or destination MAC address in the packet as well. 36

37 Thanks for attending Tony Fortunato, Sr Network Performance Specialist The Technology Firm

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks

More information

Chapter 5 Local Area Networks. Computer Concepts 2013

Chapter 5 Local Area Networks. Computer Concepts 2013 Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section

More information

Configuring Wireless Distribution System (WDS) on the WAP131 and WAP351

Configuring Wireless Distribution System (WDS) on the WAP131 and WAP351 Article ID: 5045 Configuring Wireless Distribution System (WDS) on the WAP131 and WAP351 Objective Wireless Distribution System (WDS) allows you to connect multiple access points and have them communicate

More information

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs

IT220 Network Standards & Protocols. Unit 6: Chapter 6 Wireless LANs IT220 Network Standards & Protocols Unit 6: Chapter 6 Wireless LANs 2 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of

More information

A - ELECTRONIC SCORESHEET - CONNECTIVITY INFORMATION

A - ELECTRONIC SCORESHEET - CONNECTIVITY INFORMATION A - ELECTRONIC SCORESHEET - CONNECTIVITY INFORMATION Note: This information is accurate whether we have a dedicated access point or not. In order to function properly, the Electronic Scoresheet needs to

More information

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs NT1210 Introduction to Networking Unit 6: Chapter 6, Wireless LANs Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of networks

More information

COPYRIGHTED MATERIAL. Index

COPYRIGHTED MATERIAL. Index Index Symbols and Numbers $ (dollar sign), in folder share names, 117 802.11a standard definition, 22 speed, 26 802.11b standard 802.11g standard 802.11i standard, 23 A access points compatibility, 45

More information

Instruction For Use Laptop Internet On Mobile Via Wifi In Windows Xp

Instruction For Use Laptop Internet On Mobile Via Wifi In Windows Xp Instruction For Use Laptop Internet On Mobile Via Wifi In Windows Xp Connectify me works like a charm. i have it installed in my laptop and i would Windows XP does not support Virtual WiFi and hotspots

More information

Basic Wireless Settings on the CVR100W VPN Router

Basic Wireless Settings on the CVR100W VPN Router Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.

More information

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased

More information

Wednesday, May 16, 2018

Wednesday, May 16, 2018 Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available

More information

Simple, full featured and budgetary deployment of single AP or distributed APs Hot-Spot for small scale projects.

Simple, full featured and budgetary deployment of single AP or distributed APs Hot-Spot for small scale projects. Colubris Wireless Hot-Spot solution for small and medium scale deployments 1. Definitions, goals, and objectives Simple, full featured and budgetary deployment of single AP or distributed APs Hot-Spot

More information

Web Cash Fraud Prevention Best Practices

Web Cash Fraud Prevention Best Practices Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web

More information

Tuesday, May :00 AM - 5:00 PM

Tuesday, May :00 AM - 5:00 PM Tuesday, May 15 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day One of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available

More information

Welcome to Fetch. Welcome 3. Connect Fetch to your home Wi-Fi 4. Tips to improve Wi-Fi in your home 8. Can t connect to Wi-Fi 10

Welcome to Fetch. Welcome 3. Connect Fetch to your home Wi-Fi 4. Tips to improve Wi-Fi in your home 8. Can t connect to Wi-Fi 10 Wi-Fi User Guide Welcome to Fetch Welcome 3 Connect Fetch to your home Wi-Fi 4 Tips to improve Wi-Fi in your home 8 Can t connect to Wi-Fi 10 Advanced Wi-Fi troubleshooting 1 Welcome This guide will help

More information

LEARN. Here is a simple step by step to get the most out of inssider:

LEARN. Here is a simple step by step to get the most out of inssider: Thank you for downloading inssider by MetaGeek. With inssider, MetaGeek's wireless network scanner, you'll be able to improve your Wi-Fi performance by performing a quick survey that helps you choose the

More information

Securing BYOD with Cisco TrustSec Security Group Firewalling

Securing BYOD with Cisco TrustSec Security Group Firewalling White Paper Securing BYOD with Cisco TrustSec Security Group Firewalling Getting Started with TrustSec What You Will Learn The bring-your-own-device (BYOD) trend can spur greater enterprise productivity

More information

Wireless MAXg Technology

Wireless MAXg Technology Wireless MAXg Technology MAXimizing range, performance, security and simplicity for 802.11g networks Technology Note Wireless technology has undoubtedly become a ubiquitous presence in our computing environment,

More information

Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer:

Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer: Section Number Section Header: Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer: TABLE OF CONTENTS Introduction...1

More information

Next generation wireless solutions. Ioana Manea Systems Engineer Cisco Romania

Next generation wireless solutions. Ioana Manea Systems Engineer Cisco Romania Next generation wireless solutions Ioana Manea Systems Engineer Cisco Romania Let s say a 100 Employee Company how many devices on the Wireless Network? Wireless Evolution From Best Effort to Mission Critical

More information

WL556E Portable Wireless-N Repeater

WL556E Portable Wireless-N Repeater WL556E Portable Wireless-N Repeater Table of Contents About the Device...3 Minimum System Requirements...4 Package Contents...4 Device Overview...5 Front Panel...5 Bottom Panel...6 Configuring the Device...

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

AC1900 WiFi Mesh Extender Essentials Edition

AC1900 WiFi Mesh Extender Essentials Edition AC1900 WiFi Mesh Extender Essentials Edition Model EX6400 User Manual July 2018 202-11611-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. You can

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

Wi-Fi Network applications for Apple Mac OS X

Wi-Fi Network applications for Apple Mac OS X Published on Jisc community (https://community.jisc.ac.uk) Home > Advisory services > Wireless Technology Advisory Service > Guides > Wi-Fi Network applications for Apple Mac OS X Wi-Fi Network applications

More information

Welcome. Equipment Set Up Guide

Welcome. Equipment Set Up Guide Welcome Equipment Set Up Guide 1. What s included in your install 2. How to set up and get connected SSID is simply the technical term for your Wireless Network. When you set up a wireless home network,

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Cisco Meraki Wireless Solution Comparison

Cisco Meraki Wireless Solution Comparison Solution Comparison Cisco Meraki Wireless Cisco Meraki Wireless Solution Comparison Why Cisco Meraki? Simplified cloud management Intuitive interface allows devices to be configured in minutes without

More information

Prepare Your Network for BYOD. Meraki Webinar Series

Prepare Your Network for BYOD. Meraki Webinar Series Prepare Your Network for BYOD Meraki Webinar Series 1 Agenda Introduction to Meraki and Cloud Networking BYOD objectives Taming BYOD: capacity, security & management Design considerations Live demos Product

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

Quick Start. PowerLEAP WiFi 1000 Quick Start Guide

Quick Start. PowerLEAP WiFi 1000 Quick Start Guide Quick Start PowerLEAP WiFi 1000 Quick Start Guide Package Contents In some regions, a resource CD is included with your product. 2 Getting Started Powerline adapters give you an alternative way to extend

More information

Troubleshooting End User Wireless Networks

Troubleshooting End User Wireless Networks CHAPTER 5 This chapter provides troubleshooting suggestions for typical user problems and contains these sections: Using the Cisco SSC Simplified User Interface, page 5-1 Association Failure, page 5-2

More information

Access Connections 5.1 for Windows Vista: User Guide

Access Connections 5.1 for Windows Vista: User Guide Access Connections 5.1 for Windows Vista: User Guide Access Connections 5.1 for Windows Vista: User Guide Note Before using this information and the product it supports, read the general information in

More information

EnGenius Networks Singapore Pte Ltd M-Series Products Launch Oct., 2009

EnGenius Networks Singapore Pte Ltd M-Series Products Launch Oct., 2009 EnGenius Networks Singapore Pte Ltd M-Series Products Launch Oct., 2009 What is Wireless Mesh Network? A collection of wireless devices maintaining RF connectivity to create a seamless path for data packets

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 12 Wireless Communications in Business Objectives List the advantages of wireless communications for businesses Discuss the challenges of wireless communications

More information

Roaming Among and Between WLAN Hotspots and CDMA2000

Roaming Among and Between WLAN Hotspots and CDMA2000 Roaming Among and Between WLAN Hotspots and CDMA2000 OTA Management of Roaming Profiles Using IOTA Soma Santhiveeran Sr. Product Manager/ Technologist Hotspot Critical Mass Usage per sub Critical Mass

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Deploying Mobility using Wireless VoIP

Deploying Mobility using Wireless VoIP APPLICATION N0TE ST-0119 August 29, 2005 Product: ShoreTel system System version: ShoreTel 6 Deploying Mobility using Wireless VoIP Mobility brings organizations considerable improvements in employee productivity,

More information

Table of Contents. Lucas Nülle GmbH Page 1/11

Table of Contents. Lucas Nülle GmbH Page 1/11 Table of Contents Table of Contents Communications Technology Professional practice Professional practice WLAN TWT 1 WLAN trainer SOHO TWT 2 WLAN radio link trainer Bridgelink 1 2 2 2 3 8 Lucas Nülle GmbH

More information

DHP-W313AV. PowerLine AV500 Wireless AC600 Starter Kit. Product Release

DHP-W313AV. PowerLine AV500 Wireless AC600 Starter Kit. Product Release DHP-W313AV PowerLine AV500 Wireless AC600 Starter Kit Product Release Key Selling Points Wireless AC600 PowerLine AV500 (500Mbps) Draft IEEE 1905.1 Hybrid Technology Wall-Plug design for more convenience

More information

MR74. Datasheet MR74. Dual-band 2x2 MIMO ac Wave 2 access point with separate radios dedicated to security, RF Management, and Bluetooth

MR74. Datasheet MR74. Dual-band 2x2 MIMO ac Wave 2 access point with separate radios dedicated to security, RF Management, and Bluetooth Datasheet MR74 MR74 Dual-band 2x2 MIMO 802.11ac Wave 2 access point with separate radios dedicated to security, RF Management, and Bluetooth General purpose industrial / outdoor 802.11ac Wave 2 wireless

More information

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards COUNTY OF SACRAMENTO Inter-Departmental Correspondence December 6, 2007 TO: FROM: Information Technology Policy Board Members Jeff Leveroni, Chair Technology Review Group SUBJECT: Update to County WAN/LAN

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

Activity Configuring and Securing a Wireless LAN in Packet Tracer

Activity Configuring and Securing a Wireless LAN in Packet Tracer Activity Configuring and Securing a Wireless LAN in Packet Tracer Objectives: 1. Configure a Wireless Access Point (WAP) local IP address. 2. Configure a WAP with an SSID. 3. Change the administrator s

More information

NDSU Wireless. Bruce Curtis David Dahl Valerie Nordsletten

NDSU Wireless. Bruce Curtis David Dahl Valerie Nordsletten NDSU Wireless Bruce Curtis David Dahl Valerie Nordsletten Wireless Security Acronyms WEP = Wired Equivalent Privacy WPA = Wi-Fi Protected Access WEP is broken WEP really means Won t Even Protect WPA is

More information

5 Tips to Fortify your Wireless Network

5 Tips to Fortify your Wireless Network Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In

More information

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS WHITE PAPER BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS INTRODUCTION As more companies embrace the broad usage of individual liable mobile devices or BYOD for access to corporate applications and data,

More information

Cisco Securing Cisco Wireless Enterprise Networks (WISECURE) Download Full Version :

Cisco Securing Cisco Wireless Enterprise Networks (WISECURE) Download Full Version : Cisco 300-375 Securing Cisco Wireless Enterprise Networks (WISECURE) Download Full Version : https://killexams.com/pass4sure/exam-detail/300-375 QUESTION: 42 Which two considerations must a network engineer

More information

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.

More information

The All-in-One, Intelligent NXC Controller

The All-in-One, Intelligent NXC Controller The All-in-One, Intelligent NXC Controller Centralized management for up to 200 APs ZyXEL Wireless Optimizer for easily planning, deployment and maintenance AP auto discovery and auto provisioning Visualized

More information

Table of Contents. Table of Contents Communications Technology Professional practice Professional practice WLAN TWT 1 WLAN trainer SOHO

Table of Contents. Table of Contents Communications Technology Professional practice Professional practice WLAN TWT 1 WLAN trainer SOHO Table of Contents Table of Contents Communications Technology Professional practice Professional practice WLAN TWT 1 WLAN trainer SOHO 1 2 2 3 3 Lucas Nülle GmbH Page 1/7 www.lucas-nuelle.com Communications

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

SERIES 4500 Wi-Fi Visual-Pager Display INSTALLATION and SPECIFICATION GUIDE. Microframe Corporation 604 South 12th Street Broken Arrow, OK 74012

SERIES 4500 Wi-Fi Visual-Pager Display INSTALLATION and SPECIFICATION GUIDE. Microframe Corporation 604 South 12th Street Broken Arrow, OK 74012 SERIES 4500 Wi-Fi Visual-Pager Display INSTALLATION and SPECIFICATION GUIDE Microframe Corporation 604 South 12th Street Local: 918-258-4839 Toll Free: Website: www.microframecorp.com E-mail: support@microframecorp.com

More information

Quick Start Guide for Standalone EAP

Quick Start Guide for Standalone EAP Quick Start Guide for Standalone EAP CHAPTERS 1. Determine the Management Method 2. Build the Network Topology 3. Log In to the EAP 4. Edit the SSID 5. Configure and Manage the EAP This guide applies to:

More information

EnGenius Quick Start Guide

EnGenius Quick Start Guide T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity

More information

Wireless Challenges and Resolutions

Wireless Challenges and Resolutions Wireless Challenges and Resolutions 1 Steven Shelton Senior Network Engineer Oak Ridge National Laboratory Oak Ridge, Tennessee ows@ornl.gov 2 Wireless Challenges and Resolutions Sections Common Problems

More information

Network Deployment Guide for NovoPRO

Network Deployment Guide for NovoPRO Network Deployment Guide for NovoPRO NovoPRO is a wireless presentation and collaboration system designed to support highly interactive and collaborative meetings or classroom learning activities. Meeting

More information

PRODUCT GUIDE Wireless Intrusion Prevention Systems

PRODUCT GUIDE Wireless Intrusion Prevention Systems PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing

More information

Standard For IIUM Wireless Networking

Standard For IIUM Wireless Networking INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version

More information

Cisco Network Admission Control (NAC) Solution

Cisco Network Admission Control (NAC) Solution Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,

More information

WI-FI HUB+ TROUBLESHOOTING GUIDE

WI-FI HUB+ TROUBLESHOOTING GUIDE WI-FI HUB+ TROUBLESHOOTING GUIDE Overview This guide is here to provide some answers to some commonly asked questions about your Wi-Fi Hub+. Tip: you can connect to your Wi-Fi Hub+ using an Ethernet cable

More information

AirMagnet Wireless LAN Design

AirMagnet Wireless LAN Design AirMagnet Wireless LAN Design Source: AirMagnet Survey Pro + Spectrum XT Tom Woodyer Senior Product Specialist APAC Q3, 2010 Todays agenda. Understand the media Wireless Network Basics Types of Wireless

More information

Cisco Deploying Basic Wireless LANs

Cisco Deploying Basic Wireless LANs Cisco Deploying Basic Wireless LANs WDBWL v1.2; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course is designed to give you a firm understanding of the Cisco Unified Wireless

More information

Cisco EXAM Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product.

Cisco EXAM Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product. Cisco EXAM - 640-722 Implementing Cisco Unified Wireless Networking Essentials (IUWNE) Buy Full Product http://www.examskey.com/640-722.html Examskey Cisco 640-722 exam demo product is here for you to

More information

Fix Home Network. Thousands of satisfied users! Easy steps to setup Wireless router with Cable or DSL internet service provider.

Fix Home Network. Thousands of satisfied users! Easy steps to setup Wireless router with Cable or DSL internet service provider. Fix Home Network Thousands of satisfied users! Easy steps to setup Wireless router with Cable or DSL internet service provider. Copyright, Legal Notice and Disclaimer: This publication is protected under

More information

Bring Your Own Design: Implementing BYOD Without Going Broke or Crazy. Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless

Bring Your Own Design: Implementing BYOD Without Going Broke or Crazy. Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless Bring Your Own Design: Implementing BYOD Without Going Broke or Crazy Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless Taking the Scary out of BYOD What Enterprises REALLY Want 1 2 3 4 5 6

More information

Real4Test. Real IT Certification Exam Study materials/braindumps

Real4Test.   Real IT Certification Exam Study materials/braindumps Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 400-351 Title : CCIE Wireless Vendor : Cisco Version : DEMO Get Latest & Valid 400-351 Exam's Question and

More information

Full file at

Full file at Guide to Networking Essentials, Sixth Edition 2-1 Chapter 2 Network Hardware Essentials At a Glance Instructor s Manual Table of Contents Overview Objectives Tips Quick Quizzes Class Discussion Topics

More information

from the drop down menu. Clone your PC's MAC address under the DNS settings.

from the drop down menu. Clone your PC's MAC address under the DNS settings. I entered setup.ampedwireless.com and it failed to open the Setup Wizard. 1. Make sure your computer is connected to the Router using the included Ethernet cable. Do not try to connect with a wireless

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

WIRELESS AS A BUSINESS ENABLER. May 11, 2005 Presented by: Jim Soenksen and Ed Sale, Pivot Group

WIRELESS AS A BUSINESS ENABLER. May 11, 2005 Presented by: Jim Soenksen and Ed Sale, Pivot Group WIRELESS AS A BUSINESS ENABLER May 11, 2005 Presented by: Jim Soenksen and Ed Sale, Pivot Group Presentation Goals Describe the need for and benefits of Wireless Networking Describe the risks involved

More information

CEEVA-Mesh MR Series

CEEVA-Mesh MR Series MR SERIES DATASHEET CEEVA-Mesh MR Series Cloud managed networking for less money. CEEVA-Mesh creates smarter, simpler networks. Built with the needs of business, education, retail and hospitalty in mind,

More information

Troubleshooting Guide - ViaFit

Troubleshooting Guide - ViaFit Prepared by: Matt McConley, Todd Willkomm Date Prepared: 12/31/2014 Effective Date: 2/9/2015 CONTENTS General... 1 Issues... 2 1. Connect Issues... 2 1.1 During workout, shows "Login Successful" and then

More information

ARUBA INSTANT Combining enterprise-class Wi-Fi with unmatched affordability and configuration simplicity

ARUBA INSTANT Combining enterprise-class Wi-Fi with unmatched affordability and configuration simplicity ARUBA INSTANT Combining enterprise-class Wi-Fi with unmatched affordability and configuration simplicity Table of Contents Introduction... 3 Aruba Instant Overview... 4 Aruba Instant APs... 4 Adaptive

More information

GoodMeasure Integrator Installation Guide for EDMI MK7A Meters

GoodMeasure Integrator Installation Guide for EDMI MK7A Meters GoodMeasure Integrator Installation Guide for EDMI MK7A Meters Before installation, check that you have a portable computer that you can use while on site to login to www.goodmeasure.net during the installation

More information

GoodMeasure Connector Installation Guide

GoodMeasure Connector Installation Guide GoodMeasure Connector Installation Guide Before installation, check that you have a portable computer that you can use while on site to login to www.goodmeasure.net during the installation The Connector

More information

Chapter 7. Basic Wireless Concepts and Configuration. Part I

Chapter 7. Basic Wireless Concepts and Configuration. Part I Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Models: UniFi AP-Mini (UAP-Mini), UniFi AP (UAP), UniFi AP-Long Range (UAP-LR), UniFi AP-Outdoor (UAP-Outdoor)

Models: UniFi AP-Mini (UAP-Mini), UniFi AP (UAP), UniFi AP-Long Range (UAP-LR), UniFi AP-Outdoor (UAP-Outdoor) Enterprise WiFi System Models: UniFi AP-Mini (UAP-Mini), UniFi AP (UAP), UniFi AP-Long Range (UAP-LR), UniFi AP-Outdoor (UAP-Outdoor) Unlimited Indoor/Outdoor AP Scalability in a Unified Management System

More information

Session 1 exercise Download and save locally. When completing the exercise, please mail it to

Session 1 exercise Download and save locally. When completing the exercise, please mail it to Download and save locally. When completing the exercise, please mail it to adva@mercantec.dk WLAN windows 7/8 Let s examine your windows 7/8 laptop WLAN capabilities. Open a commando prompt as administrator,

More information

PHS BYOD Frequently Asked. Question

PHS BYOD Frequently Asked. Question PHS BYOD Frequently Asked Questions We are fully implementing BYOD again at Pickens High School this year. This program will allow students to use their mobile devices at school as an educational tool.

More information

Managed Campus WiFi Networks A Brief Overview. For academic, not-for-profit use only.

Managed Campus WiFi Networks A Brief Overview. For academic, not-for-profit use only. Managed Campus WiFi Networks A Brief Overview For academic, not-for-profit use only. 1 Your Typical WiFi Users I can t use my FaceBook!! What s wrong with YOUR system? Image borrowed from the Internet

More information

23 Must-Have WiFi Features

23 Must-Have WiFi Features 23 Must-Have WiFi Features Installing, updating or expanding a WiFi network can seem complicated because of the long list of features available and the always-evolving nature of technology. The point of

More information

A Series Enterprise WiFi that just works.

A Series Enterprise WiFi that just works. A Series Enterprise WiFi that just works. Open Mesh makes WiFi smarter and simpler. We help create powerful, easy-to-use wireless networks that automatically spread Internet connections throughout hotels,

More information

54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 1.8

54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 1.8 54M/150M/300Mbps USB WIRELESS ADAPTER Version 1.8 Introduction Thank you for purchasing the IEEE 802.11b/g or 802.11n. This Wireless Adapter is easy to use and easy to setup. If you have been tired of

More information

Datasheet. Enterprise WiFi System. Models: UAP, UAP-LR, UAP-Pro, UAP-Outdoor, UAP-Outdoor5. Unlimited Indoor/Outdoor AP Scalability in a

Datasheet. Enterprise WiFi System. Models: UAP, UAP-LR, UAP-Pro, UAP-Outdoor, UAP-Outdoor5. Unlimited Indoor/Outdoor AP Scalability in a Enterprise WiFi System Models: UAP, UAP-LR, UAP-Pro, UAP-Outdoor, UAP-Outdoor5 Unlimited Indoor/Outdoor AP Scalability in a 1 The UniFi Enterprise WiFi System is a scalable enterprise access point solution

More information

Wireless 11n Smart Repeater AP (1T1R)

Wireless 11n Smart Repeater AP (1T1R) (1T1R) 2014 Table of Contents 1. Introduction...3 1.1 Package contents... 3 1.2 Product Features... 3 1.3 Front Panel Description... 4 1.4 Rear Panel Description... 5 2. Installation...6 2.1 Hardware Installation...

More information

The Basic Setup Wizard could not automatically configure my Internet connection.

The Basic Setup Wizard could not automatically configure my Internet connection. I forgot the touch screen passcode for the Router and can no longer access the Touch Screen Menu. 1. Once you have exhausted all attempts at recovering your passcode, reset the Router to default settings

More information

Universal WiFi Extender - Powerline Edition (XAVN2001) Installation Guide

Universal WiFi Extender - Powerline Edition (XAVN2001) Installation Guide Universal WiFi Extender - Powerline Edition (XAVN2001) Installation Guide Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on the label of your product

More information

3GWIFIMRD. 3.5G plus WLAN Desktop Server Router. Quick Setup Guide. 1 Version 1.0

3GWIFIMRD. 3.5G plus WLAN Desktop Server Router. Quick Setup Guide. 1 Version 1.0 3GWIFIMRD 3.5G plus WLAN Desktop Server Router Quick Setup Guide 1 Version 1.0 Declaration of Conformity Marking by the above symbol indicates compliance with the Essential Requirements of the R&TTE Directive

More information

WAP9112/9114 Quick Start Guide

WAP9112/9114 Quick Start Guide WAP9112/9114 Quick Start Guide Release 7.6 NN47252-308 Issue 02.01 March 2016 Contents Chapter 1: Introduction... 3 Chapter 2: Required Software Components... 4 Chapter 3: Installing or Upgrading Wireless

More information

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question

More information

Configuring your Home Wireless Network

Configuring your Home Wireless Network Configuring your Home Wireless Network Questions How many of you have more than one computer at home? How many of you connect to the Internet using broadband (Cable or DSL) How many already have a home

More information

vsolution Cynap Pure Network Integration

vsolution Cynap Pure Network Integration vsolution Cynap Pure Network Integration 1. Basics... 2 2. Glossary... 2 2.1. LAN / Ethernet settings... 2 2.2. WLAN settings access point... 3 2.3. WLAN settings infrastructure (Cynap Pure acts as client)...

More information

L Operating instructions Wireless LAN PCI-Card MiMo 300 Express

L Operating instructions Wireless LAN PCI-Card MiMo 300 Express L Operating instructions Wireless LAN PCI-Card MiMo 300 Express 1. Installing the wireless LAN PCI card... Page 02 2. Installing the driver and configuration program on Windows... Page 02 3. The configuration

More information

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps Cisco 300-375 Dumps with Valid 300-375 Exam Questions PDF [2018] The Cisco 300-375 Securing Cisco Wireless Enterprise Networks (WISECURE) exam is an ultimate source for professionals to retain their credentials

More information

WIRELESS N USB ADAPTER USER MANUAL

WIRELESS N USB ADAPTER USER MANUAL WIRELESS N USB ADAPTER USER MANUAL MAN-525503/525534-UM-0413-01 INTRODUCTION Thank you for purchasing this Manhattan Wireless N USB Adapter. Because many netbooks and laptops (especially those more than

More information

A42 Enterprise WiFi that just works.

A42 Enterprise WiFi that just works. A42 Enterprise WiFi that just works. Open Mesh makes WiFi smarter and simpler. We help create powerful, easy-to-use wireless networks that automatically spread Internet connections throughout hotels, apartments,

More information

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. Access Point WIRELESS. WAP54G v2. Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. Access Point WIRELESS. WAP54G v2. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point User Guide Model No. WAP54G v2 Copyright and Trademarks Specifications are subject to change without notice. Linksys is

More information