Linksys WVC11B manual Wireless-B Internet Video Camera

Page 70

Wireless-B Internet Video Camera

PCs unprotected by a firewall router should at least run firewall software, and all PCs should run up-to-date antiviral software.

8) WEP

Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is overstating WEP's ability. Again, this can only provide enough security to make a hacker’s job more difficult.

WEP encryption implementation was not put in place with the 802.11 standard. This means that there are about as many methods of WEP encryption as there are providers of wireless networking products. In addition, WEP is not completely secure. One piece of information still not encrypted is the MAC address, which hackers can use to break into a network by spoofing (or faking) the MAC address.

Programs exist on the Internet that are designed to defeat WEP. The best known of these is AirSnort. In about a day, AirSnort can analyze enough of the wireless transmissions to crack the WEP key. Just like a dictionary- building attack, the best prevention for these types of programs is by not using static settings, periodically changing WEP keys, SSID, etc.

There are several ways that WEP can be maximized:

a)Use the highest level of encryption possible

b)Use multiple WEP keys

c)Change your WEP key regularly

Current encryption technology offers 64-bit and 128-bit WEP encryption. If you are using 64-bit WEP, swap out your old wireless units for 128-bit encryption right away. Where encryption is concerned, the bigger and more complex, the better. A WEP key is a string of hexadecimal characters that your wireless network uses in two ways. First, nodes in your wireless network are identified with a common WEP key. Second, these WEP keys encrypt and decrypt data sent over your wireless network. So, a higher level of security ensures that hackers will have a harder time breaking into your network.

Setting one, static WEP key on your wireless network leaves your network open the threats even as you think it is protecting you. While it is true that using a WEP key increases wireless security, you can increase it further by using multiple WEP keys.

Keep in mind that WEP keys are stored in the firmware of wireless cards and access points and can be used to hack into the network if a card or access point falls into the wrong hands. Also, should someone hack into your network, there would be nothing preventing someone access to the entire network, using just one static key.

Appendix B: Wireless Security

63

What Are The Risks?

Image 70
Contents Wireless- B How to Use this Guide Copyright and TrademarksTable of Contents View Video Setup Help Appendix a TroubleshootingAppendix B Wireless Security Common Problems and Solutions Frequently Asked QuestionsList of Figures Camera LEDsFind Camera from LAN 17 Create Links Introduction What’s in this Guide? Wireless-B Internet Video Camera Ad-Hoc and Infrastructure Modes Planning Your Wireless NetworkNetwork Layout Planning Your Wireless Network Network Layout Getting to Know the Wireless-B Internet Video Camera LANReset Connection to a Wireless Ad-Hoc Network for Setup Connecting the Wireless-B Internet Video Camera for SetupConnection to a Wired Network for Setup OverviewMoving the Camera to a Different Network Setting up and Mounting the Wireless-B Internet Video Camera Setup WizardCameras Found Dhcp or Static IP Address Mode Settings 10 Security Settings 12 Review New Settings Stand Option Placement OptionsWall Mount Option Installing the Viewer & Recorder Utility Install Viewer & Recorder UtilityChoose Destination Location Using the Viewer & Recorder Utility CamerasFind LANChange Settings InternetDelete 12 Delete CameraView 13 View VideoScheduled Recordings in Progress FilesPreferences ScheduleAdd Stop21 Stop Scheduled Recording Setting up the Linksys SoloLink Ddns Service Setup Wizard for the SoloLink Ddns ServiceSoloLink for Dynamic IP Address Check Connections User Name and Password Login Confirm Active Internet Connection 11 Sign Up 12 Confirmation of New Settings 14 Confirm Your Location ID 17 Create Links 19 Account Confirmation of Camera SoloLink Registration of Additional Cameras 21 Port Forwarding Information24 SoloLink Ddns How to Access the Web-based Utility View VideoSetup Security WarningLAN Settings Device SettingsBasic Wireless Settings WEP Key SettingsImage Resolution Quality Level Bit RateVideo Settings Estimated Bit Rates for Video Viewing or RecordingAdministrator PasswordAdjustments OptionsUsers User AccessUser Database SoloLink Ddns SoloLink DdnsStatus SoloLink Registration of Additional CamerasWireless-B Internet Video Camera Status LogAdvanced UPnP18 Administrator Help Help19 Upgrade Firmware Appendix a Troubleshooting Common Problems and SolutionsWhen I view the video, it seems blurry Frequently Asked Questions Can I view video using a Macintosh or Netscape Navigator?How many users can view the Camera’s video at the same time? Brief Overview Appendix B Wireless SecurityWhat Are The Risks? Passive Attacks Jamming AttacksDictionary-Building or Table Attacks Maximizing Wireless SecurityActive Attacks Man-in-the-Middle AttacksWireless-B Internet Video Camera Ssid Wireless-B Internet Video Camera Figure B-2 WEP Key Settings WEP EncryptionFigure C-1 Upgrade Firmware Appendix C Upgrading FirmwareShared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-B Internet Video Camera Wireless-B Internet Video Camera Wireless-B Internet Video Camera Wireless-B Internet Video Camera Wireless-B Internet Video Camera User Authentication, WEP Encryption Appendix F SpecificationsStandards Ieee 8011.b, Ieee 802.3, 802.3u Ports Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementSoftware License Agreement Wireless-B Internet Video Camera Industry Canada Canada Wireless-B Internet Video Camera Need to contact Linksys? Appendix I Contact InformationInformation section in this Guide