Cisco Systems WRV54G manual Passive Attacks, Jamming Attacks

Page 68

Wireless-G VPN Broadband Router

But even WEP has its problems. WEP's encryption algorithm is referred to as "simple", which also means "weak", because the technology that scrambles the wireless signal isn't too hard to crack for a persistent hacker.

There are five common ways that hackers can break into your network and steal your bandwidth as well as your data. The five attacks are popularly known as:

1.Passive Attacks

2.Jamming Attacks

3.Active Attacks

4.Dictionary-building or Table Attacks

5.Man-in-the-Middle Attacks

Passive Attacks

There's no way to detect a passive attack because the hacker is not breaking into your network. He is simply listening (eavesdropping, if you will) to the information your network broadcasts. There are applications easily available on the Internet that can allow a person to listen into your wireless network and the information it broadcasts. Information such as MAC addresses, IP addresses, usernames, passwords, instant message conversations, emails, account information, and any data transmitted wirelessly, can easily be seen by someone outside of your network because it is often broadcast in clear text. Simply put, any information transmitted on a wireless network leaves both the network and individual users vulnerable to attack. All a hacker needs is a "packet sniffer", software available on the Internet, along with other freeware or shareware hacking utilities available on the Internet, to acquire your WEP keys and other network information to defeat security.

Jamming Attacks

Jamming Attacks, when a powerful signal is sent directly into your wireless network, can effectively shut down your wireless network. This type of attack is not always intentional and can often come about simply due to the technology. This is especially possible in the 2.4 GHz frequency, where phones, baby monitors, and microwave ovens can create a great deal of interference and jam transmissions on your wireless network. One way to resolve this is by moving your wireless devices into the 5 GHz frequency, which is dedicated solely to information transmissions.

Appendix B: Wireless Security

64

What Are The Risks?

Image 68
Contents 802 GHz .11g Wireless- G Word definition How to Use this GuideCopyright and Trademarks Table of Contents Wireless Security Frequently Asked QuestionsIntroduction WelcomeWhat’s in this Guide? Wireless-G Broadband VPN Router Planning your Wireless Network Router’s FunctionsIP Addresses What’s an IP Address?Dynamic IP Addresses Why do I need a VPN?Dhcp Dynamic Host Configuration Protocol Servers What is a VPN? VPN Router to VPN Router Wireless-G VPN Broadband Router Getting to Know the Wireless-G VPN Broadband Router Back PanelFront Panel DMZConnecting the Wireless-G Broadband Router OverviewWired Connection to a PC Wireless Connection to a PCWireless-G VPN Broadband Router Configuring the PCs Configuring Windows 98 and Millennium PCsConfiguring Windows 2000 PCs PropertiesConfiguring Windows XP PCs Wireless Configuring the RouterSetup Access Restrictions AdministrationSecurity Applications & GamingHow to Access the Web-based Utility Setup TabBasic Setup Tab Internet SetupStatic Internet Connection Type Optional Settings Required by some ISPs Pptp Internet Connection TypeNetwork Setup Ddns Tab DynDNS.orgMAC Address Clone Tab See Figure Advanced Routing TabMAC Clone Advanced RoutingStatic Routing 10 Routing TableWireless Network Wireless TabBasic Wireless Settings See Figure Wireless Security WEP See FigureWireless Network Access See Figure 13 Wireless Network AccessAdvanced Wireless Settings See Figure 15 Advanced Wireless SettingsSecurity Tab FirewallVPN 18 Manual Key Management 19 Advanced VPN Tunnel Setup WEP Access Restrictions Tab Access Restriction23 Internet Filter Summary Applications and Gaming Tab Port Range ForwardingPort Triggering 27 Port TriggeringUPnP Forwarding 28 UPnP ForwardingDMZ Management Administration TabRouter Password Log UPnPEmail Alert Syslog NotificationDiagnostics Notification Queue LengthAlert Log General Log33 Factory Default Status RouterInformation WAN ConnectionsLocal Network 36 Local Network38 Wireless System PerformanceNeed to set a static IP address on a PC Appendix a TroubleshootingCommon Problems and Solutions Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router TCP UDP Can’t get the Internet game, server, or application to work Firmware upgrade failed, and/or the Power LED is flashing To start over, I need to set the Router to factory defaultNeed to upgrade the firmware My DSL service’s PPPoE is always disconnecting Power LED flashes continuouslyFrequently Asked Questions Where is the Router installed on the network?Is IPSec Pass-Through supported by the Router? Does the Router support IPX or AppleTalk?What is Network Address Translation and what is it used for? Does the Router support ICQ send file?How can I block corrupted FTP downloads? What is DMZ Hosting? What are the advanced features of the Router?Is the Router cross-platform compatible? How many ports can be simultaneously forwarded?What is the Ieee 802.11g standard? What Ieee 802.11b features are supported?What is ad-hoc mode? What is infrastructure mode? What is ISM band? What is Spread Spectrum? What is DSSS? What is FHSS? And what are their differences? What is WEP?Have excellent signal strength, but I cannot see my network How do I reset the Router?How do I resolve issues with signal loss? What Are The Risks? Appendix B Wireless SecurityBrief Overview Passive Attacks Jamming AttacksMaximizing Wireless Security Active AttacksDictionary-Building or Table Attacks Man-in-the-Middle Attacks5SSID 8WEP Wireless-G VPN Broadband Router 4GHz/802.11b and 802.11g WEP Encryption Figure B-2 WEPEnvironment WRV54GHow to Establish a Secure IPSec Tunnel Create an IPSec PolicyBuild Filter Lists Filter List 1 win-routerFilter List 2 router-win Figure C-4 IP Filter ListFigure C-7 IP Filter List Configure Individual Tunnel Rules Tunnel 1 win-routerFigure C-13 Authentication Methods Figure C-16 Tunnel Setting Tab Tunnel 2 router-winFigure C-19 IP Filter List Tab Figure C-22 Preshared Key Assign New IPSec Policy Figure C-25 Connection TypeCreate a Tunnel Through the Web-Based Utility Figure C-28 VPN TabFigure D-1 IP Configuration Screen Windows 98 or Me InstructionsWindows 2000 or XP Instructions Figure D-3 MAC Address/Physical AddressAppendix E Snmp Functions Figure F-1 Upgrade Firmware Appendix F Upgrading FirmwareNetwork Neighborhood/My Network Places Appendix G Windows HelpShared Resources Appendix H Glossary Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Wireless-G VPN Broadband Router Up to 54Mbps wireless, up to 100 Mbps LAN Appendix I SpecificationsTransmit Power 19dBm LEDs Appendix J Regulatory Information FCC StatementFCC Part 68 Statement Safety Notices Appendix K Warranty Information Limited WarrantyAppendix L Contact Information