Cisco Systems WMA11B manual Wireless-B Media Adapter

Page 49

Wireless-B Media Adapter

PCs unprotected by a firewall router should at least run firewall software, and all PCs should run up-to-date antiviral software.

8) WEP

Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is overstating WEP's ability. Again, this can only provide enough security to make a hacker’s job more difficult.

WEP encryption implementation was not put in place with the 802.11 standard. This means that there are about as many methods of WEP encryption as there are providers of wireless networking products. In addition, WEP is not completely secure. One piece of information still not encrypted is the MAC address, which hackers can use to break into a network by spoofing (or faking) the MAC address.

Programs exist on the Internet that are designed to defeat WEP. The best known of these is AirSnort. In about a day, AirSnort can analyze enough of the wireless transmissions to crack the WEP key. Just like a dictionary- building attack, the best prevention for these types of programs is by not using static settings, periodically changing WEP keys, SSID, etc.

There are several ways that WEP can be maximized:

a)Use the highest level of encryption possible

b)Use multiple WEP keys

c)Change your WEP key regularly

Current encryption technology offers 64-bit and 128-bit WEP encryption. If you are using 64-bit WEP, swap out your old wireless units for 128-bit encryption right away. Where encryption is concerned, the bigger and more complex, the better. A WEP key is a string of hexadecimal characters that your wireless network uses in two ways. First, nodes in your wireless network are identified with a common WEP key. Second, these WEP keys encrypt and decrypt data sent over your wireless network. So, a higher level of security ensures that hackers will have a harder time breaking into your network.

Setting one, static WEP key on your wireless network leaves your network open the threats even as you think it is protecting you. While it is true that using a WEP key increases wireless security, you can increase it further by using multiple WEP keys.

Keep in mind that WEP keys are stored in the firmware of wireless cards and access points and can be used to hack into the network if a card or access point falls into the wrong hands. Also, should someone hack into your network, there would be nothing preventing someone access to the entire network, using just one static key.

Appendix B: Wireless Security

42

What Are The Risks?

Image 49
Contents 802 GHz .11b Wireless- B Copyright and Trademarks How to Use this GuideTable of Contents Appendix C Planning Your Use of the Wireless-B Media Adapter List of Figures For SetupUnplug the Power Figure E-1 XP Default Interface Welcome IntroductionWhat’s in this Guide? Wireless-B Media Adapter Back Panel Power Ssid your wireless network’s name Remote Controller Overview Connection to a Wired Network for SetupConnect the Power Running the Setup Wizard Setting up the Wireless-B Media AdapterWindows Installer Screen License Agreement Screen Connection for Setup Screen 10 Connection after Setup Screen 12 Basic Wireless Settings Screen 13 Wireless Security Settings Screen Using the Utility’s Icon in Your PC’s System Tray Using the Adapter UtilityMedia Folder Manager Using the Start MenuInstructions Move the Adapter and its power adapter to the TVConnecting to Your TV and Stereo Connecting the Adapter to Your Network Connecting to Your TV OnlyVertical Position Placement OptionsInstalling the Adapter Utility Using the TV Setup10 Microsoft .NET Framework Package Screen 12 Select Music and Pictures Folders Screen Setting up the Adapter from Your TV14 Media Adapter Setup Music Menus Using the Media NavigatorAll Songs Choose MusicNow Playing How to Play MusicMusic Options Choose Pictures Pictures MenuNow Showing Picture Options How to Start a Slideshow with Music12 Help Screen HelpCommon Problems and Solutions Appendix a TroubleshootingPicture won’t change on the TV What types of picture files can I show with the Adapter? Frequently Asked QuestionsWhat types of playlist files can I use with the Adapter? Can I play music from a CD using the Adapter? Brief Overview Appendix B Wireless SecurityWhat Are The Risks? Jamming Attacks Passive AttacksActive Attacks Maximizing Wireless SecurityDictionary-Building or Table Attacks Man-in-the-Middle AttacksWireless-B Media Adapter Ssid Wireless-B Media Adapter WEP Encryption Using the Adapter as Part of Your Wired Network Using the Adapter as Part of Your Wireless NetworkAppendix D Creating a Playlist Figure E-1 XP Default Interface Appendix E Setting a Static IP Address on Your PCFigure E-5 IP Address Click the OK button again to exit Shared Resources Appendix F Windows HelpNetwork Neighborhood/My Network Places Appendix G Glossary Wireless-B Media Adapter Wireless-B Media Adapter Wireless-B Media Adapter Wireless-B Media Adapter Wireless-B Media Adapter Standards Ieee 802.11b, Ieee 802.3, Ieee 802.3u Ports Appendix H SpecificationsOperating Temp Power External, 5V DC, 2.0 a CertificationsStorage Temp Operating HumidityLimited Warranty Appendix I Warranty InformationFCC Statement Appendix J Regulatory InformationIndustry Canada Canada Wireless-B Media Adapter Chapter K Contact Information