Wireless Router Security Who Am I? Tom Tirrell BSEE Computer Engineering, UofM Ann Arbor MSEE Computer Engineering/Communication Theory, Wayne State, Detroit.

Slides:



Advertisements
Similar presentations
Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
Advertisements

Installing a Wireless Home Network
CY-SWR1100 Dual Band Wireless N Router
How To Set Up A Wireless Network Using A D-Link Wireless Router
Application Guide For Mesh AP – MAP-3120
DAP-1520 FAQ’s Wireless AC750 Dual Band Range Extender.
DSL-2870B How to Change ADSL Username and Password in your modem router How to Change Wireless Channel in your modem router How to Open Ports in your modem.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Bag-O-Bytes October 6 th, 2004 Home Networking Presented by The FPB Help Desk x6322.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
DIR-505 All-in-One Mobile Companion Greg Quinlan Technical Trainer.
DVG-N5402SP.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
D-Link International Call Center Training and Staff Development Department Module: DAP-1350 Module: DAP-1350.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
XP 1 New Perspectives on Microsoft Windows XP, 2005 Service Pack 2 Update Appendix D Microsoft Windows XP, Service Pack 2 Update Appendix D – Setting Up.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
TEW-691GR Training TEW-691GR Training TEW-691GR 450Mbps Wireless N Gigabit Router.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
NETWORKS: MOBILE BUSINESS
Bluetooth Technology Who Am I?
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
SOHO Wireless Networking SCATA Nov 2005 Dr Duncan Hancox.
Wireless Networking 102.
DWR-113 FAQ’s 3G WiFi Router.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Ch. 5 – Access Points. Overview Access Point Connection.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
1 Chapter Overview Wireless Technologies Wireless Security.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Wireless Networks Tamus, Zoltán Ádám
CIS 103 — Applied Computer Technology Last Edited: September 17, 2010 by C.Herbert Wireless Home Networks.
Computer Concepts 2014 Chapter 5 Local Area Networks.
DSL-2544N Dual Band Wireless N600 Gigabit ADSL2+ Modem Router
EDT 661 Kelly Maurer. (((DS))) (((WIRELESS PRINTER))) ((( NETBOOK ))) DESKTOP ROUTER MODEM INTERNET /DLS (FROM WALL)
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
Presented by Hampton Smith  An IEEE (Institute for Electrical and Electronics Engineers) protocol ratified in 1997 which defines a standard.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Setting Wireless Network At Home By: Parveen Sharma.
Ryan Heaton Dick Al-Bayaty Wi-Fi How Wireless Communication works.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
Securing your Personal Wireless Networks By: Bryan Oxendale.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
LINCWorks Mesh Networking User Guide. This user guide will give a brief overview of mesh networking followed by step by step instructions for configuring.
How to Use LINCWorks as a Wireless Repeater For additional help please contact: Paul Peterson
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
How To Set Up A Wireless Network
1. Press the Power button or switch to flip on the printer, if it is turn off. 2. From the Home display screen on the product control panel, click the.
Installing the HP LaserJet Pro 500 color MFP M570 printer software in Windows on a Wireless Network & Wired Network.
FIXMYWIFI EXTENDER. STEP 1: OPEN THE DEVICE FROM THE PACKED BOX, THEN CONNECT THE ANTENNA TO THE DEVICE, AFTER COMPLETING THE PROCESS OF CONNECTING.
Chapter 12 Communications Security & Countermeasures
An Introduction to Wireless Router Setups
Presentation transcript:

Wireless Router Security Who Am I? Tom Tirrell BSEE Computer Engineering, UofM Ann Arbor MSEE Computer Engineering/Communication Theory, Wayne State, Detroit Applications of computers in industry was my profession Networking computers is my hobby

Wireless Router Security Home Wireless Networks Or What I Won’t be Talking about Today Network Interface Modem Wireless Router Signal from ISP Satellite Radio Fiber Optic Cable Co-axial Cable Outside “Box” Satellite Dish I3812 NID (fiber) Green Metal Box NID to Modem wires Coax Telephone wire 2-Wire Modem/Router Cable Modem Telephone Modem LAN Cable

Wireless Router Security Home Wireless Networks Part 2 Or What I will be Talking About Today 2-Wire Modem/Router Wireless Router

Wireless Router Security An inSSIDer view of Wireless Networks

Wireless Router inSecurity An inSSIDer view of Wireless Networks

Wireless Router inSecurity This House is Unlocked

Wireless Router Security Authentication Protocols Open – not an option, anyone can connect Shared – one step up from really bad, requires a key to log on WEP – Fair, better than nothing, but “gone in 60 seconds” WPA– Better, still has similar weaknesses as WEP WPA2 – Best, state of the art, for now

Wireless Router Security Five Necessary Steps and One Cool Idea Go to the router configuration page in your browser: xxx.xxx 1.Set a unique password for router configuration. 2.Set a unique Network Name (SSID) 3.Set Security or Authentication Type to WPA2-Personal(PSK)-AES 4.Set a unique Key as large as is convenient. 5.Disable Wi-Fi Protected Setup (WPS) 6.Disable SSID Broadcast

Wireless Router Security There is a tradeoff between compatibility, convenience and levels of security. There is no tradeoff between whether or not to use security. Even older and less secure methods are better than no security at all. Modern methods of encryption may not be compatible with older devices. Check the manuals on your network devices to see what levels of security they can use. Select the highest security level that you can and then see if all the devices on your network can still connect. If not, back down a level until everything works. The Tradeoff

Wireless Router Security Linksys WRT54g Wireless Router You can download manuals for Linksys/Cisco routers at this URL: aspx?pid=80&vw=1&articleid=22501

Wireless Router Security Linksys WRT54g Wireless Router In your browser, go to

Wireless Router Security Linksys WRT54g Wireless Router You will be asked for a User Name and Password. If you know what they are, enter them now. If you don’t know it, try the default user name and password which are: Default User Name : blank Default Password: admin

Wireless Router Security Linksys WRT54g Wireless Router If none of these work, press the “reset” button on the back of the router.

Wireless Router Security Linksys WRT54g Wireless Router

Disable Wi-Fi Protected Setup (WPS)

Linksys WRT54g Wireless Router Network Name (SSID)

Linksys WRT54g Wireless Router Network Name (SSID)

Linksys WRT54g Wireless Router Security Mode

Linksys WRT54g Wireless Router Encryption

Linksys WRT54g Wireless Router Passphrase/Wireless Key

Linksys WRT54g Wireless Router Router Password

Wireless Router Security ATT 2-Wire Router Configuration In your browser, go to

ATT 2-Wire Router Configuration Router Configuration Web Page

ATT 2-Wire Router Configuration Wi-Fi Protected Setup??

ATT 2-Wire Router Configuration Saving Settings, system Password.

ATT 2-Wire Router Configuration Default System Password

ATT 2-Wire Router Configuration System Password Failed!

ATT 2-Wire Router Configuration Password Hint

ATT 2-Wire Router Configuration Resetting You System Password

ATT 2-Wire Router Configuration Password Accepted, Configuration Saved

Wireless Router Security Network Name (SSID)

Wireless Router Security SSID Broadcast

ATT 2-Wire Router Configuration Enable Wireless Security

ATT 2-Wire Router Configuration Authentication/Encryption Type

ATT 2-Wire Router Configuration Wireless Key

ATT 2-Wire Router Configuration Wireless Key

ATT 2-Wire Router Configuration Save Your Settings

Wireless Router Security SSID Broadcasting Disabled

Wireless Router Security SSID Broadcasting Disabled

Wireless Router Security SSID Broadcasting Disabled

Wireless Router Security I Can’t Do this! If you can’t secure your network as described above, there are still choices you can make. In order of increasing cost: 1.Turn off your router when you aren’t using it. 2.Use only wired connections. Disable the wireless access point. All wireless routers have at least a couple of wired LAN inputs. 3.Don’t share sensitive files across the network. Don’t use shared disk drives or folders. 4.Update your wireless adapter to one that can use a better security method.

Wireless Router Security References 1.Wikipedia articles on WEP, WPA, Wireless Security, Wi-Fi Protected Access and the IEEE standard 2.The Home WLAN website at WPA.htmlhttp:// WPA.html 3.“Applied Cryptography”, 2 nd edition, by Bruce Schneier, Wiley & Sons, “Principles of Communication: Systems, Modulation and Noise”, Ziemer and Tranter, Houghton Mifflin, Institute of Electrical and Electronic Engineers (IEEE) Wireless Network Standard “Networking Bible”, Barrie Sosinsky, Wiley, “Cryptography Engineering”, Nies Ferguson, Bruce Schneier, Tadayoshi Kohno, Wiley Publishing, 2010

Wireless Router Security Wireless Modes network standards protocol Release [6] [6] Freq. (GHz) Bandwidth (MHz) Data rate Data rate per stream (Mbit/s) [7] [7] Allowable MIMO streams MIMO Modulation Approximate indoor range [citation needed]citation needed Approximate outdoor range [citation needed]citation needed (m)(ft)(m)(ft) —Jun , 21DSSSDSSS, FHSSFHSS aSep , 9, 12, 18, 24, 36, 48, 54 1OFDM [A] [A] ——5,00016,000 [A] [A] bSep , 111DSSS gJun , 9, 12, 18, 24, 36, 48, 54 1 OFDMOFDM, DSSS DSSS nOct / , 14.4, 21.7, 28.9, 43.3, 57.8, 65, 72.2 [B] [B] 4OFDM [8] [8] 40 15, 30, 45, 60, 90, 120, 135, 150 [B] [B] [8 [8

Wireless Router Security 2.4 GHz Channels Spread Spectrum modulation causes the radio energy to spread across several channels. Due to the high frequency, short distance, this is usually not a problem You can select a set of non-overlapping channels when you have several routers The most common is channels 1, 6 and 11 as shown here. In North America, only channels 1-11 are used