The Tutorials Below Will Cover Setting Up and Securing A Wireless Network For The Home and A Business
The Tutorials Below Will Cover Setting Up and Securing A Wireless Network For The Home and A Business
The Tutorials Below Will Cover Setting Up and Securing A Wireless Network For The Home and A Business
1. 2. 3. 4. 5.
Setting Up A Home Wireless Network Setting Up A Business Wireless Network Guidelines For Securing Your Wireless Network Reduce Interference in your wireless network Related Terms
What is Wireless Networking? It is a type of networking technology that allows computers to communicate with other computers (as well as other wireless-equipped devices) without using cables. Instead, wireless networking uses radio signals to receive and transmit data between wireless access points and wireless network cards operating on the 2.4 GHz frequency band. Each wireless device exchanges signals with an Access Point, also called a Router. Access points, in turn, communicate with other network devices. An Access Point is typically a piece of hardware, but solutions are also available that allow a computer with a wireless card to act as an Access Point.
process. It is important to note that the default SSID (Service Set Identifier) number is often set to 101, so you should change it to a different number to ensure that your wireless connection remains secure. Hackers know many of the default SSID's. By default, encryption is not enabled. Encryption is important, because hackers equipped with the necessary devices can sniff the packets transmitted by the wireless network, thereby compromising your data. Wired Equivalent Privacy (WEP) is a protocol used for encrypting packets on a wireless network. It uses a 64-bit (or 256-bit, depending on the vendor) shared key algorithm. Using WEP will increase the protection on your data, but doing so will reduce the effective data rates.
o Access Points o Wireless LAN Adapters o Wireless Cards. Determine the number of users who'll need to have access to the network. This will be the determining factor on the amount of access points needed. Placement of your wired LAN is critical. The obvious goal is to maximize the access point's wireless range. A usual range is a maximum of 300 feet, but many environment factors come into play, such as, walls, water pipes, cables or anything that could produce interference thus decreasing the range. Try to keep to a range of around 150 feet. This will create a greater throughput (A measure of the data transfer rate through a typically complex communications system or of the data-processing rate in a computer system). Configure your wireless devices to work with your network. Before you go live with your new network, ensure that you test the installation using link test software. Test for signal strength, percentage of data sent correctly and the time it takes to receive a response from the destination device. Make sure that you provide security for your new LAN. Wireless communications are transmitted through the air making it very easy to extract information, providing you do not have network security. There are many wireless-specific security solutions that you can implement. The three basic security tactics used are: 1. MAC: Medium Access Control: In a WLAN network card, the MAC is radio controller protocol. It corresponds to the ISO Network Model's level 2 Data Link layer. The IEEE 802.11 standard specifies the MAC protocol for medium sharing, packets formats and addressing, and error detection. 2. WEP Encryption: Short for Wired Equivalent Privacy- a security protocol for wireless local area networks (WLANs) defined in the 802.11b standard. WEP is designed to provide the same level of security as that of a wired LAN. 3. Traditional VPN: Virtual Private Network - A way to communicate through a dedicated server securely to a corporate network over the internet. Windows NT, 2000 and XP offer native VPN support. Also, VPNs are recommended to secure 802.11b wireless LANs as well.
Common examples of pre-defined SSIDs are simple names like "wireless," "netgear," "linksys," or "default." An SSID can be changed at any time, as long as the change is also made on all wireless clients. Disable SSID broadcast: By default, most wireless access points will broadcast the SSID to all wireless devices. This would allow anyone with a wireless network card that can detect the SSID you use to gain access to your network. This feature of Wi-Fi network protocols is intended to allow clients to dynamically discover and roam between WLANs. In a home Wi-Fi network, roaming is largely unnecessary and the SSID broadcast feature serves no useful purpose. Use MAC address filtering: MAC filtering is the process of configuring an access point with a list of MAC addresses that will be allowed or not allowed to gain access to the rest of the network via that WAP. Only MAC addresses that have been registered with the wireless access point are able to gain access to your network. You can usually locate the MAC address of your network card on the device itself. Always change the default user name and password for your wireless access point: Guessing the default user names and passwords for the wireless access points is a common practice for hackers to gain access to networks. Turn off DHCP: Consider setting the wireless router to assign static IP addresses to the machines on your home network and turn off DHCP. Refrain from using the default IP subnet: If you turn off DHCP, consider changing the IP subnet. Many routers use 192.168.1.0 for the network and 192.168.1.1 as the address for the router. It is easy for people to guess the IP addresses used and illegally gain access to the network. Enable WEP: It is disabled by default. WEP is not considered totally secure, but it is free and will provide an initial barrier. Purchase network adapters and access points that support at least 128-bit WEP. Some network adapters may only require a driver upgrade to increase to 128-bit encryption.
Related Terms:
WEP: Wired Equivalent Privacy is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, which is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. SSID: A service set identifier is a sequence of characters that uniquely names a wireless local area network (WLAN). MAC address In a local area network (LAN) or other network, the MAC (Media Access Control) address is your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet address.) Static IP: A static IP address is a number that is assigned to a computer to be its permanent address on the network. DHCP: Dynamic Host Configuration Protocol (DHCP) is a communications protocol that automates the assignment of Internet Protocol (IP) addresses in a network. Subnet: A subnet is an identifiably separate part of a network. Typically, a subnet may represent all the machines at one geographic location, in one building, or on the same local area network (LAN). LAN: Local Area Network - A network connecting computers in a relatively small area such as a building. WLAN: Wireless Local Area Network - Refers to wireless networks between computers within one building or a group of buildings. Wi-Fi: Wireless Fidelity - A standard that ensures equipment from different manufacturers works together with reasonable certainty. MAC: Media Access Control - the globally unique hardware address of an Ethernet network interface card. WAP: Wireless Application Protocol - standard for accessing the internet with wireless devices. Sniffer: A program used to capture data across a computer network. Used by hackers to capture user id names and passwords. Software tool that audits and identifies network traffic packets. Is also used legitimately by network operations and maintenance personnel to troubleshoot network problems. Bonus Tip: How WI-FI Works: Short for Wireless Fidelity. Wi-Fi technology, or 802.11a/b/g, works much the same as your digital cordless phone. Your voice is picked up by a microphone, then your voice is converted into a digital signal. This digital signal is then transmitted to the base unit. The base unit takes the data coming in from the phone line and converts that signal and sends it to the cordless phone. A wireless connection of any kind works in this same fashion. There will always be a two-way communication going on. Your wireless access point or router is like your cordless phone base unit and your network interface card is like your cordless phone. The only difference between these two types of technology is that one converts a sound signal and the other converts a radio signal.
[Top]