ZyXEL Communications 320W Can the Ssid be encrypted?, What are Insertion Attacks?, Open System

Page 69

P320W Support Notes

Can the SSID be encrypted?

WEP, the encryption standard for 802.11, only encrypts the data packets not the 802.11 management packets and the SSID is in the beacon and probe management messages. The SSID is not encrypted if WEP is turned on. The SSID goes over the air in clear text. This makes obtaining the SSID easy by sniffing 802.11 wireless traffic.

By turning off the broadcast of SSID, can someone still sniff the SSID?

Many APs by default have broadcasting the SSID turned on. Sniffers typically will find the SSID in the broadcast beacon packets. Turning off the broadcast of SSID in the beacon message (a common practice) does not prevent getting the SSID; since the SSID is sent in the clear in the probe message when a client associates to an AP, a sniffer just has to wait for a valid user to associate to the network to see the SSID.

What are Insertion Attacks?

The insertion attacks are based on placing unauthorized devices on the wireless network without going through a security process and review.

What is Wireless Sniffer?

An attacker can sniff and capture legitimate traffic. Many of the sniffer tools for Ethernet are based on capturing the first part of the connection session, where the data would typically include the username and password. An intruder can masquerade as that user by using this captured information. An intruder who monitors the wireless network can apply this same attack principle on the wireless.

What is the difference between Open System and Shared Key of Authentication Type?

Open System:

The default authentication service that simply announces the desire to associate with another station or access point. A station can authenticate with any other station or access point using open system authentication if the receiving station designates open system authentication.

Share Key:

The optional authentication that involves a more rigorous exchange of frames, ensuring that the requesting station is authentic. For a station to use shared key authentication, it must implement WEP.

69

All contents copyright (c) 2005 ZyXEL Communications Corporation.

Image 69
Contents Prestige 320W P320W Support Notes Ireless FAQ Trouble Shooting Ethernet connection Internet ConnectionTCP/IP Installation TCP/IP ConfigurationSetting up the Prestige router P320W Support Notes P320W Support Notes Configure an Internal Server Behind SUA Smtp Service Port NumberUsing the Dynamic DNS Ddns Snmp Overview Network Management Using SnmpP320W Support Notes SNMPv1 Operations GetNext GetSet TrapZyXEL Snmp Implementation Get Community Configure the Prestige for SnmpUsing Prestige traffic redirect Set CommunityTraffic Redirect on LAN port What is UPnP Using Universal Plug n Play UPnPUsing UPnP in ZyXEL devices Go to Management-UPnP, check Enable UPnP service P320W Support Notes Finally, your video conversation is achieved What is Infrastructure mode? Infrastructure ModeP320W Support Notes Configuration Wireless Station to Infrastructure mode P320W Support Notes Double click on the AP you want to associated with MAC Filter Overview Wireless MAC Address FilteringZyXEL MAC Filter Implementation Configure the Wlan MAC FilterIntroduction WEP ConfigurationP320W Support Notes Setting up the Access Point Setting up the Station Key settingsP320W Support Notes P320W Support Notes Ieee 802.1x Introduction IeeeAuthenticator Authentication ServerSupplicant Authentication Port State and Authentication Control Re-Authentication Eapol Exchange between 802.1x Authenticator and Supplicant P320W Support Notes Using WEB Configuration Using External Radius Authentication Server P320W Support Notes Site Survey Survey on Site PreparationP320W Support Notes P320W Support Notes What is the P320W 802.11g Wireless Firewall Router? FAQWill the P320W work with my Internet connection? What is PPPoE?What do I need to use the Prestige? Does the Prestige support PPPoE?Why does my provider use PPPoE? How do I know I am using PPPoE?How can I configure the Prestige? Which Internet Applications can I use with the Prestige?How does e-mail work through the Prestige? How fast can the data go? What Dhcp capability does the Prestige support?Your ISP checks the MAC address Your ISP checks the Host Name What is Ddns What is BOOTP/DHCPWhen do I need Ddns service? What is a network firewall? What makes P320W secure?What are the basic types of firewalls? What kind of firewall is the P320W? What is Denials of Service DoS attack?What is Teardrop attack? What is Ping of Death attack?What is SYN Flood attack? What is Land attack?What is IP Spoofing attack? What is a Wireless LAN?What are the advantages of Wireless LANs? What are the disadvantages of Wireless LANs? Where can you find wireless 802.11 networks?What is an Access Point? What is 802.11b? What is Ieee 802.11?What is 802.11a? What is 802.11g?Does the 802.11 interfere with Bluetooth devices? What is Wi-Fi?Can radio signals pass through walls? Is it possible to use products from a variety of vendors?What is Infrastructure mode? What is Ad Hoc mode?How many Access Points are required in a given area? Whats the difference between a Wlan and a WWAN?What is Frequency-hopping Spread Spectrum Technology FHSS? What is Direct-Sequence Spread Spectrum Technology DSSS?Why the 2.4 Ghz Frequency range? What is Server Set ID SSID?What is WEP? What is an ESSID?What is the difference between 40-bit and 64-bit WEP? What is a WEP key?Can the Ssid be encrypted? What is Wireless Sniffer?What are Insertion Attacks? Open SystemWhat is 802.1x? What is AAA?What is RADIUS? Why cannot access the Internet? Why cannot access the Prestige from my computer?Your ISP checks the MAC address Unable to run applications ZyXEL SUA Supporting TableApplication Outgoing Connection Incoming Connection NAT-T P320W Support Notes