What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

Size: px
Start display at page:

Download "What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne"

Transcription

1 Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor

2 What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in New York, and it meows in Los Angeles. The wireless is the same way, only without the cat. - Attributed to Albert Einstein Chino Information Technology Center 2

3 What is a Wireless LAN? (really) It is a LAN Extension of Wired LAN Uses High Frequency Radio Waves (RF) Speed : 2Mbps to 54Mbps Distance 100 feet to 15 miles (with fancy antennas) Chino Information Technology Center 3

4 How WLANs Operate Although a variety of radio frequency WLANs exist, different products share similarities and operate similarly Only two components are required ed for a wireless network Wireless network interface (NIC) cards Access points (AP) Chino Information Technology Center 4

5 Wireless Network Interface Card NICs connect a computer to the network so it can send and receive data On wired network, NIC has a port for a cable connector On wireless network, the NIC has an antenna to send and receive RF signals Chino Information Technology Center 5

6 Desktop PC Wireless NIC Chino Information Technology Center 6

7 Notebook Wireless NIC PCMCIA wireless NICs are available for notebook PCs Some vendors integrate components of wireless NIC onto single chip on motherboard Chino Information Technology Center 7

8 Software for Wireless NICs Software may be part of operating system itself Windows XP has software integrated while previous versions of Windows do not Software may be separate program loaded into the computer All operating systems before Windows XP, require loading software Chino Information Technology Center 8

9 Access Point An access point (AP) has three main parts An antenna and a radio transmitter/receiver An RJ-45 wired network interface to connect to a wired network Special bridging software Chino Information Technology Center 9

10 Access Point Chino Information Technology Center 10

11 Functions of an Access Point Access point has two basic functions Acts as base station for wireless network Acts as bridge between wireless and wired network Chino Information Technology Center 11

12 Access Point Characteristics Max range approximately 375 feet (115 meters) Expect a LOT less when there are obstructions Supports as many as 100 users s One access point for each 50 users with light and basic Internet access One access point per 20 users for heavy network access and large file transfer APs typically mounted on ceiling, but AC power may be a problem Chino Information Technology Center 12

13 Features of Access Points Coverage area should overlap when using multiple l access points Clients find the AP that provides the best service A seamless handoff occurs when client associates with new AP Chino Information Technology Center 13

14 WLAN Alphabet Soup IEEE family of specifications for WLANs 2.4GHz 2Mbps a 5GHz, 54Mbps b Often called Wi-Fi, 2.4GHz, 11Mbps g 2.4GHz, 54Mbps i Newly adopted encryption standard parts of i are already available (WPA, TKIP, AES) on some new hardware/software Chino Information Technology Center 14

15 Chino Information Technology Center 15

16 Wireless Topologies There are multiple modes of operation for wireless devices Chino Information Technology Center 16

17 WLAN Terms & Basic Concept Ad Hoc Mode Wireless client-to-client communication Chino Information Technology Center 17

18 WLAN Terms & Basic Concept Infrastructure Mode All clients connect via an Access Point AP Chino Information Technology Center 18

19 WLAN Terms & Basic Concept SSID or BSSID Basic Service Set Identifier beacon BSS BSSID or SSID (Basic Service Set Identifier) An AP forms an association with one or more wireless clients that is referred to as a Basic Service Set beacon beacon Chino Information Technology Center 19

20 WLAN Terms & Basic Concept ESSID Extended Service Set Identifier ESS To increase the range and coverage of a wireless network, overlapping APs are installed. This is referred to as an Extended Service Set ESSID (Extended Service Set Identifier) Chino Information Technology Center 20

21 WLAN Terms & Basic Concept WEP Optional method to encrypt (scramble) transmissions Offers some level of protection for wireless networks NOT enabled by default Chino Information Technology Center 21

22 WLAN Terms & Basic Concept There are 11 channels used by b & g Most APs default to channel a 1 uses 2 3 different 4 5 (higher 6 7 frequency) channels Channel 4 Channel 5 Channel 9 Channel 10 Channel 3 Channel 8 Channel 2 Channel 7 Channel 1 Channel 6 Channel Chino Information Technology Center 22 Frequency (GHz)

23 WLAN Risk Unauthorized Clients In range Malicious client Detector Chino Information Technology Center 23

24 WLAN Risk Unauthorized or Renegade Access Points Interception and unauthorized monitoring of wireless traffic Client-to-Client Attacks Jamming (DoS) Client-to-client attack Jamming malicious Chino Information Technology Center 24

25 WLAN Risk - Fake Access Point Access Point Clone (Evil Twin) Traffic Interception AP1 AP1* Chino Information Technology Center 25

26 WLAN Risk Brute force attacks against access point passwords WEP weakness Misconfiguration Chino Information Technology Center 26

27 WLAN Risk (continued) WEP weakness WEP security flaws documented in a 2001 UC Berkley study Weak encryption (never intended for repeated use) Short keys (64bits 24bit Init Vector = 40 bits) Static Keys No distribution method (shared key) Chino Information Technology Center 27

28 WLAN Risk (continued) Mis-configurations Default SSID SSID broadcasting is on by default Default Password SNMP Community (RO & RW) Newer hardware/firmware turns this off by default Default security settings (none) Chino Information Technology Center 28

29 WLAN Risk Unauthorized installation Rogue APs can open a back door to the network. Who is allowed to install? Where are they be installed? Chino Information Technology Center 29

30 WLAN Risk Network Stumbler Chino Information Technology Center 30

31 WLAN Risk Wardriving Network Stumbler Chino Information Technology Center 31

32 WLAN Risk Low cost product prevalent limited features, insecure Well-intentioned user may compromise network security Accidental detection Windows xp automatically discovers access points Chino Information Technology Center 32

33 Wireless LAN Protection Strategies Chino Information Technology Center Steve Siedschlag, Associate Professor

34 Recommendations Wireless LAN related Configuration Enable WEP, use 128bit key Disable SSID Broadcasts No SNMP access Use MAC (hardware) address to restrict access Non-default Access Point password Change default Access Point Name Use 802.1x / WPA / i (when available) Chino Information Technology Center 34

35 Wireless LAN related Configuration Enable WEP, use 128bit key Chino Information Technology Center 35

36 Wireless LAN related Configuration Enable WEP, use 128bit key Chino Information Technology Center 36

37 Wireless LAN related Configuration Enable WEP, use 128bit key Chino Information Technology Center 37

38 Wireless LAN related Configuration Disable SSID Broadcast Chino Information Technology Center 38

39 Wireless LAN related Configuration No SNMP access Chino Information Technology Center 39

40 Wireless LAN related Configuration Use 802.1x / WPA / i (when available) Chino Information Technology Center 40

41 General Recommendations Always (wired or wireless) Install virus protection software plus automatic frequent pattern file update Shared folders must impose password Management Issue Prohibit installation of AP s without authorization Discover any new APs constantly (NetStumbler is free, Antenna is cheap) Power off Access Point when not in use Carefully select the physical location of your AP, not near windows or front doors. Chino Information Technology Center 41

42 Thank You! Computer Network Security Resources at the Robert Pile Chino Information Technology Center CIS-420 PC Security & Privacy CISNTWK-440 Fund. Of Network Security (Security+) CISNTWK-441 Firewalls & Intrusion Detection CISNTWK-442 Disaster Recovery Planning CISNTWK-445 Windows Security Administration CISNTWK-447 Linux Security Administration Steve Siedschlag Associate Professor Chino Information Technology Center 42

Wireless Networks. Lecture 4: Wireless Networking Devices. Assistant Teacher Samraa Adnan Al-Asadi 1

Wireless Networks. Lecture 4: Wireless Networking Devices. Assistant Teacher Samraa Adnan Al-Asadi 1 Wireless Networks Lecture 4: Wireless Networking Devices Assistant Teacher Samraa Adnan Al-Asadi 1 Contents wireless LAN adapter cards wireless access Points wireless bridges wireless routers Assistant

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

Wireless Router at Home

Wireless Router at Home Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless

More information

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms

More information

Table of Contents. Chapter 1Introduction Package Contents Features Specifications Physical Description...

Table of Contents. Chapter 1Introduction Package Contents Features Specifications Physical Description... Table of Contents Chapter 1Introduction... 3 1.1 Package Contents... 3 1.2 Features... 3 1.3 Specifications... 3 1.4 Physical Description... 4 Chapter 2Wireless LAN Access Point Connection... 5 Chapter

More information

802.11g PC Card/USB Wireless Adapter

802.11g PC Card/USB Wireless Adapter 802.11g PC Card/USB Wireless Adapter User Guide Regulatory Approvals FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of

More information

PRODUCT GUIDE Wireless Intrusion Prevention Systems

PRODUCT GUIDE Wireless Intrusion Prevention Systems PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

Chapter 10: Wireless LAN & VLANs

Chapter 10: Wireless LAN & VLANs Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1

More information

Wireless LAN Access Point

Wireless LAN Access Point Wireless LAN Access Point IEEE 802.11b/g 54Mbps 501903 User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...

More information

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03

Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03 Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03 Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

ITRAINONLINE MMTK WIN98 WIRELESS CLIENT INSTALLATION

ITRAINONLINE MMTK WIN98 WIRELESS CLIENT INSTALLATION ITRAINONLINE MMTK WIN98 WIRELESS CLIENT INSTALLATION Developed by: Onno W. Purbo & Bruno Roger Client installation for other Windows versions This document will show and example of the driver installation

More information

Family Structural Overview

Family Structural Overview Some IEEE 802 Standards TELE301 Lecture 5 802.11 Wireless Networking David Eyers Telecommunications Programme University of Otago 802.1 Bridging and Management 802.1X,... 802.3 Ethernet 802.11 Wireless

More information

Wireless LAN Access Point

Wireless LAN Access Point Wireless LAN Access Point IEEE 802.11b/g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...

More information

802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge

802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge Datasheet ECB1750 802.11ac 3x3 Dual Band High-Powered Wireless Access Point/Client Bridge The ECB1750 marks a new speed and performance breakthrough for users with 802.11ac laptops and other devices, who

More information

LevelOne User Manual WNC-0600USB N_One Wireless USB Adapter

LevelOne User Manual WNC-0600USB N_One Wireless USB Adapter LevelOne User Manual WNC-0600USB N_One Wireless USB Adapter V2.0.0-0712 i Safety FCC WARNING This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to

More information

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012 NWD2705 Dual-Band Wireless N450 USB Adapter Version 1.00 Edition 1, 09/2012 Quick Start Guide User s Guide www.zyxel.com Copyright 2012 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE

More information

Appendix E Wireless Networking Basics

Appendix E Wireless Networking Basics Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical

More information

Wireless g AP. User s Manual

Wireless g AP. User s Manual Wireless 802.11g AP User s Manual Version 1.8 User s Guide 0 Copyright Statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,

More information

LESSON 12: WI FI NETWORKS SECURITY

LESSON 12: WI FI NETWORKS SECURITY LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information

More information

802.11N Wireless Broadband Router

802.11N Wireless Broadband Router 802.11N Wireless Broadband Router Pre-N Wireless Access Point Broadband Internet Access WPS 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless Router Features... 1

More information

Chapter 1 Introduction

Chapter 1 Introduction Copyright Statement is the registered trademark of Zonet Technology Inc. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective holders. Copyright

More information

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp Questions Have you used a wireless local area network before? At home? At work? Have you configured a wireless AP before?

More information

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov. Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE

More information

Wireless Bridge User Manual. Version 1.0

Wireless Bridge User Manual. Version 1.0 Wireless Bridge 520645 User Manual Version 1.0 FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should

More information

Digital Entertainment. Networking Made Easy

Digital Entertainment. Networking Made Easy Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks

More information

LevelOne. User Manual. WAP Mbps PoE Wireless AP V3.0.0

LevelOne. User Manual. WAP Mbps PoE Wireless AP V3.0.0 LevelOne WAP-0005 108Mbps PoE Wireless AP User Manual V3.0.0 i TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 1 FIGURE 1: WIRELESS ACCESS POINT... 1 FEATURES OF YOUR WIRELESS ACCESS POINT... 1 Security Features...

More information

EAP Wireless Access Point. 2.4 GHz b/g 54 Mbps

EAP Wireless Access Point. 2.4 GHz b/g 54 Mbps EAP-3660 is a small form factor wireless product. It is stylish and looks like a smoke detector on the ceiling. EAP-3660 is a / Repeater / WDS that operates seamlessly in the 2.4 GHz frequency spectrum

More information

Wireless networking with three times the speed and five times the flexibility.

Wireless networking with three times the speed and five times the flexibility. Wireless 150N Outdoor Range Extender / Access Point Multiple SSIDs, Wireless client isolation, Bridge, Repeater, WDS, Passive PoE, Built-in 12dBi Antenna Part No.: 525497 Wireless networking with three

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Configuring Cipher Suites and WEP

Configuring Cipher Suites and WEP 10 CHAPTER This chapter describes how to configure the cipher suites required to use WPA authenticated key management, Wired Equivalent Privacy (WEP), Temporal Key Integrity Protocol (TKIP), and broadcast

More information

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver LevelOne WBR-3407 11g Wireless ADSL VPN Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless ADSL Router Features... 1 Package Contents... 5 Physical Details... 6 CHAPTER

More information

Chapter 5 Local Area Networks. Computer Concepts 2013

Chapter 5 Local Area Networks. Computer Concepts 2013 Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

Wireless Access Point

Wireless Access Point 802.11g / 802.11b / WPA Wireless Access Point User Guide TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 1 Features of your Wireless Access Point... 1 Package Contents... 4 Physical Details... 4 CHAPTER 2

More information

Wireless LAN Access Point

Wireless LAN Access Point Wireless LAN Access Point IEEE 802.11b 11Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...

More information

CE MARK WARNING LIMITED WARRANTY

CE MARK WARNING LIMITED WARRANTY CE MARK WARNING This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. LIMITED WARRANTY Hawking

More information

Configuring WEP and WEP Features

Configuring WEP and WEP Features CHAPTER 9 This chapter describes how to configure Wired Equivalent Privacy (WEP), Message Integrity Check (MIC), and Temporal Key Integrity Protocol (TKIP). This chapter contains these sections: Understanding

More information

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Objective A Wireless Access Point (WAP) is a networking device that allows wireless-capable devices to connect to

More information

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users

More information

Wireless Networking Basics. Ed Crowley

Wireless Networking Basics. Ed Crowley Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2

More information

Wireless LAN Connection Guide

Wireless LAN Connection Guide Wireless LAN Connection Guide Precautions When Using Wireless LAN... 2 Preparing to Use a Wireless LAN Environment... 2 Checking the Network Environment to Be Used on the Wireless LAN... 2 Selecting a

More information

Wednesday, May 16, 2018

Wednesday, May 16, 2018 Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available

More information

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. Access Point WIRELESS WAP54G (EU/LA/UK) Model No.

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. Access Point WIRELESS WAP54G (EU/LA/UK) Model No. A Division of Cisco Systems, Inc. GHz 2,4 802.11g WIRELESS Wireless-G Access Point User Guide Model No. WAP54G (EU/LA/UK) Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

Configuring Wireless Security Settings on the RV130W

Configuring Wireless Security Settings on the RV130W Article ID: 5021 Configuring Wireless Security Settings on the RV130W Objective Wireless networking operates by sending information over radio waves, which can be more vulnerable to intruders than a traditional

More information

WL-5420AP. User s Guide

WL-5420AP. User s Guide WL-5420AP User s Guide Table of contents INTRODUCTION... 1 About the Operation Modes...2 LED Indicators...5 Solid...5 Ports on the Rear Panel...7 GETTING CONNECTED... 8 WPA AP -CONFIGURATION VIA WEB...

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Wireless High power Multi-function AP

Wireless High power Multi-function AP Wireless High power Multi-function AP EAP-3660 2.4GHz Super G 108Mbps Access Point/ WDS/Universal Repeater The EAP-3660 is a smoke detector looking Wireless Access Point / Universal Repeater / WDS that

More information

Wireless-G USB Dongle. User Manual. Ver 1.00

Wireless-G USB Dongle. User Manual. Ver 1.00 Wireless-G USB Dongle User Manual Ver 1.00 Table of Contents 1. Introduction 1.1The Wireless-G USB Dongle 1.2 Key Feature 2. Planning Your Wireless Network 2.1 Network Topology 2.2 Ad-Hoc versus Infrastructure

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted. Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.

More information

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC Agenda Wireless Technology Overview IEEE 802.11 WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies Wireless Technologies

More information

CSCD 433/533 Advanced Networking

CSCD 433/533 Advanced Networking CSCD 433/533 Advanced Networking Lecture 6 Wireless LAN Components and Characteristics Winter 2017 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Introduction

More information

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Wireless Networking based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Wireless Networking 802.11 based on Chapter 15 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers topics Standards Technical Concepts Implementation Troubleshooting 802.11 timeline source: Anandtech

More information

Wireless N USB Adapter. User Guide

Wireless N USB Adapter. User Guide Wireless N USB Adapter User Guide Part#: PL-18N Model: Hermes V. 0613 Contents Chapter 1 Getting Start...3 Chapter 2 Installation Guide...5 Installing the Drivers for Mac OS X...10 Uninstall the Drivers

More information

U S E R M A N U A L b/g PC CARD

U S E R M A N U A L b/g PC CARD U S E R M A N U A L 802.11b/g PC CARD Table of Content CHAPTER 1 INTRODUCTION... 1 1.1 WIRELESS LAN FEATURE FUNCTIONS... 1 1.2 REGULATORY NOTICE... 1 1.2.1 FCC Class B Statement...1 1.2.2 Canadian Regulatory

More information

D-Link AirPlus G DWL-G700AP

D-Link AirPlus G DWL-G700AP TM D-Link AirPlus G DWL-G700AP 2.4GHz Wireless Access Point Manual Building Networks for People Contents Package Contents...3 Introduction...4 Wireless Basics...6 Getting Started...8 Using the Configuration

More information

Chapter 24 Wireless Network Security

Chapter 24 Wireless Network Security Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically

More information

Chapter 7. Basic Wireless Concepts and Configuration. Part I

Chapter 7. Basic Wireless Concepts and Configuration. Part I Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Naveen Kumar. 1 Wi-Fi Technology

Naveen Kumar. 1 Wi-Fi Technology Naveen Kumar 1 Contents 2 Introduction Need of Purpose History How a Wi-Fi Network Works Topologies & Configurations Applications Wi-Fi Security Advantages & Limitations Innovations Introduction 3 Wireless

More information

SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide

SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide About this guide This Quick Start Guide describes how to install and operate your SAGEM Wi-Fi 11g USB ADAPTER. Please read this manual before you install the

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

Procedure: You can find the problem sheet on the Desktop of the lab PCs. University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Advance Networks Laboratory 907529 Lab.3 WLAN Security Objectives 1. Configure administrator accounts.

More information

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007) WPA SECURITY (Wi-Fi Protected Access) Presentation By Douglas Cheathem (csc 650.01 Spring 2007) OUTLINE Introduction Security Risk Vulnerabilities Prevention Conclusion Live Demo Q & A INTRODUCTION! WPA

More information

Wireless 300N Access Point 300 Mbps, MIMO, Bridge, Repeater, Multiple SSIDs and VLANs Part No.:

Wireless 300N Access Point 300 Mbps, MIMO, Bridge, Repeater, Multiple SSIDs and VLANs Part No.: Wireless 300N Access Point 300 Mbps, MIMO, Bridge, Repeater, Multiple SSIDs and VLANs Part No.: 524728 Wireless networking with three times the speed and five times the flexibility. The INTELLINET NETWORK

More information

Thursday, May 29,

Thursday, May 29, 1 Computer Networks in The Home Connecting your computers, peripherals and other electronic devices with Ethernet using TCP/IP 1 Introduction Home Networking - connecting computers and other devices together

More information

Outdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0

Outdoor High Power b/g/n Wireless USB Adapter USER MANUAL 4.0 Outdoor High Power 802.11b/g/n Wireless USB Adapter USER MANUAL 4.0 2012 Contents 1 Introduction... 3 2 Hardware Installation... 4 3 Driver Installation... 6 3.1 Windows XP... 6 3.2 Windows Vista... 9

More information

Chapter 3 Wireless Configuration

Chapter 3 Wireless Configuration Chapter 3 Wireless Configuration This chapter describes how to configure the wireless features of your WNR854T router. In planning your wireless network, you should consider the level of security required.

More information

EnGenius Quick Start Guide

EnGenius Quick Start Guide T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity

More information

PracticeTorrent. Latest study torrent with verified answers will facilitate your actual test

PracticeTorrent.   Latest study torrent with verified answers will facilitate your actual test PracticeTorrent http://www.practicetorrent.com Latest study torrent with verified answers will facilitate your actual test Exam : H12-311 Title : Huawei Certified ICT Associate-Wireless Local Area Network

More information

Wireless SOHO Router/Bridge 2.4 GHz b/g 54 Mbps

Wireless SOHO Router/Bridge 2.4 GHz b/g 54 Mbps Wireless SOHO Router/Bridge ECB-1220R 2.4 GHz 802.11 b/g 54 Mbps ECB-1220R is a 2.4GHz 802.11b/g broadband Wi-Fi Router with advanced AP/Client Bridge/Repeater functions. So you could implement this crossover

More information

PRODUCT DESCRIPTION. Learn more about EnGenius Solutions at

PRODUCT DESCRIPTION. Learn more about EnGenius Solutions at Wireless Long Range Multi-function Client Bridge 2.4 GHz EIRP up to 400mW Access point Client Bridge Repeater Client Router PRODUCT DESCRIPTION is a powerful client bridge. It supports several networking

More information

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd.

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd. Today s challenge on Wireless Networking David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd. Agenda How Popular is Wireless Network? Threats Associated with Wireless Networking

More information

Wireless Network Security

Wireless Network Security Wireless Network Security By: Jose Rodriguez Table of Contents Wireless Network Security...1 Table of Contents...2 Introduction...3 Wireless Network Requirements...4 Wireless Network Protocols...5 Wireless

More information

WIRELESS EVIL TWIN ATTACK

WIRELESS EVIL TWIN ATTACK WIRELESS EVIL TWIN ATTACK Prof. Pragati Goel Associate Professor, NCRD s Sterling Institute of Management Studies, Navi Mumbai Mr. Chetan Singh NCRD s Sterling Institute Of Management Studie, Navi Mumbai

More information

Package Content IEEE g Wireless LAN USB Adapter... x 1 Product CD-ROM.x 1

Package Content IEEE g Wireless LAN USB Adapter... x 1 Product CD-ROM.x 1 IEEE 802.11g Wireless LAN USB Adapter Quick Installation Guide Network Configuration IEEE 802.11g Wireless LAN USB Adapter is a standard USB adapter that fits into any standard USB 2.0 and 1.1 slots in

More information

ECB3500 Wireless Long Range Multi-function 7+1 AP 2.4GHz Super G 108Mbps EIRP up to 2000mW

ECB3500 Wireless Long Range Multi-function 7+1 AP 2.4GHz Super G 108Mbps EIRP up to 2000mW WDS Bridge/Client /AP ECB3500 is a powerful, enhanced, enterprise level product supports 7 multi-functions to operate for every kind of working environment. It supports high transmit output power and high

More information

Learn How to Configure EnGenius Wi-Fi Products for Popular Applications

Learn How to Configure EnGenius Wi-Fi Products for Popular Applications Learn How to Configure EnGenius Wi-Fi Products for Popular Applications Operation Modes Access Point (AP) / WDS AP Client Bridge (CB) Repeater WDS Bridge Client Router AP Router Access Point An access

More information

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards COUNTY OF SACRAMENTO Inter-Departmental Correspondence December 6, 2007 TO: FROM: Information Technology Policy Board Members Jeff Leveroni, Chair Technology Review Group SUBJECT: Update to County WAN/LAN

More information

Wireless PCI PCMCIA Super G 108 Mbit. Manual

Wireless PCI PCMCIA Super G 108 Mbit. Manual Wireless PCI PCMCIA Super G 108 Mbit Dear Customer, Manual thanks for choosing Hamlet. Please carefully follow the instructions for its use and maintenance and, once this item has run its life span, we

More information

300Mbps Wireless Gigabit PoE Access Point

300Mbps Wireless Gigabit PoE Access Point WAP-6150 Version: 1 300Mbps Wireless Gigabit PoE Access Point The tough, high performance WAP-6150 is designed for fast wireless connectivity in enterprise or industrial environments of all dimensions.

More information

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ... Interworking 2006 Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks Interworking Conference, 15th - 17th of January 2007 Dr-Ing Kai-Oliver Detken Business URL: http://wwwdecoitde

More information

2.4GHz / 5GHz 54Mbps a/b/g Flexible Application

2.4GHz / 5GHz 54Mbps a/b/g Flexible Application Dual Radio Concurrent AP/CB EOA7535 2.4GHz / 5GHz 54Mbps 802.11a/b/g Flexible Application EOA7535 equips with two powerful independent RF interfaces which support 802.11a and 802.11b/g. With certified

More information

Wireless LAN USB Super G 108 Mbit. Manual

Wireless LAN USB Super G 108 Mbit. Manual Wireless LAN USB Super G 108 Mbit Manual Dear Customer, Thanks for choosing Hamlet. Please carefully follow the instructions for its use and maintenance and, once this item has run its life span, we kindly

More information

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional

More information

11N Wall Mount Access Point / WDS AP / Universal Repeater. Features. Fully compatible with IEEE b/g/n devices

11N Wall Mount Access Point / WDS AP / Universal Repeater. Features. Fully compatible with IEEE b/g/n devices EAP9550-KZ is a powerful and multi-functioned 11n Indoor Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly

More information

EOC1650. Wireless Access Point / Client Bridge / Client Router PRODUCT DESCRIPTION. 2.4GHz 54Mbps b/g Superior Performance

EOC1650. Wireless Access Point / Client Bridge / Client Router PRODUCT DESCRIPTION. 2.4GHz 54Mbps b/g Superior Performance Wireless Access Point / Client Bridge / Client Router 2.4GHz 54Mbps 802.11b/g Superior Performance PRODUCT DESCRIPTION is a revolutionary product consists of conciseness, quality, and flexibility. It comes

More information

CHAPTER 7 ADVANCED ADMINISTRATION PC

CHAPTER 7 ADVANCED ADMINISTRATION PC Table of Contents CHAPTER 1 INTRODUCTION... 1 54Mbps 802.11g ADSL Firewall Modem Router Features... 2 Package Contents... 4 Physical Details... 5 CHAPTER 2 INSTALLATION... 7 Requirements... 7 Procedure...

More information

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended

More information

Ruckus ZoneDirector 3450 WLAN Controller (up to 500 ZoneFlex Access Points)

Ruckus ZoneDirector 3450 WLAN Controller (up to 500 ZoneFlex Access Points) Product Name: Manufacturer: - Model Number: 901-3450-UK00 Ruckus ZoneDirector 3450 supporting up to 500 ZoneFlex APs (901-3450-UK00) The Ruckus ZoneDirector 3450, The First Simple and Powerful Enterprise

More information

Wi-Net Window and Rogue Access Points

Wi-Net Window and Rogue Access Points Wi-Net Window and Rogue Access Points The Wi-Net Window (WP150) has several features that make it ideal for detecting and locating rogue access points: A rogue access point is a wireless access point that

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information