Transcript of Wireless Router Security Who Am I? Tom Tirrell BSEE Computer Engineering, UofM Ann Arbor MSEE...
Slide 1
Wireless Router Security Who Am I? Tom Tirrell BSEE Computer
Engineering, UofM Ann Arbor MSEE Computer Engineering/Communication
Theory, Wayne State, Detroit Applications of computers in industry
was my profession Networking computers is my hobby Email:
[email protected]
Slide 2
Wireless Router Security Home Wireless Networks Or What I Wont
be Talking about Today Network Interface Modem Wireless Router
Signal from ISP Satellite Radio Fiber Optic Cable Co-axial Cable
Outside Box Satellite Dish I3812 NID (fiber) Green Metal Box NID to
Modem wires Coax Telephone wire 2-Wire Modem/Router Cable Modem
Telephone Modem LAN Cable
Slide 3
Wireless Router Security Home Wireless Networks Part 2 Or What
I will be Talking About Today 2-Wire Modem/Router Wireless
Router
Slide 4
Wireless Router Security An inSSIDer view of Wireless
Networks
Slide 5
Wireless Router inSecurity An inSSIDer view of Wireless
Networks
Slide 6
Wireless Router inSecurity This House is Unlocked
Slide 7
Wireless Router Security Authentication Protocols Open not an
option, anyone can connect Shared one step up from really bad,
requires a key to log on WEP Fair, better than nothing, but gone in
60 seconds WPA Better, still has similar weaknesses as WEP WPA2
Best, state of the art, for now
Slide 8
Wireless Router Security Five Necessary Steps and One Cool Idea
Go to the router configuration page in your browser:
192.168.xxx.xxx 1.Set a unique password for router configuration.
2.Set a unique Network Name (SSID) 3.Set Security or Authentication
Type to WPA2-Personal(PSK)-AES 4.Set a unique Key as large as is
convenient. 5.Disable Wi-Fi Protected Setup (WPS) 6.Disable SSID
Broadcast
Slide 9
Wireless Router Security There is a tradeoff between
compatibility, convenience and levels of security. There is no
tradeoff between whether or not to use security. Even older and
less secure methods are better than no security at all. Modern
methods of encryption may not be compatible with older devices.
Check the manuals on your network devices to see what levels of
security they can use. Select the highest security level that you
can and then see if all the devices on your network can still
connect. If not, back down a level until everything works. The
Tradeoff
Slide 10
Wireless Router Security Linksys WRT54g Wireless Router You can
download manuals for Linksys/Cisco routers at this URL:
http://www6.nohold.net/Cisco2/ukp.
aspx?pid=80&vw=1&articleid=22501
Slide 11
Wireless Router Security Linksys WRT54g Wireless Router In your
browser, go to 192.168.1.1
Slide 12
Wireless Router Security Linksys WRT54g Wireless Router You
will be asked for a User Name and Password. If you know what they
are, enter them now. If you dont know it, try the default user name
and password which are: Default User Name : blank Default Password:
admin
Slide 13
Wireless Router Security Linksys WRT54g Wireless Router If none
of these work, press the reset button on the back of the
router.
Wireless Router Security I Cant Do this! If you cant secure
your network as described above, there are still choices you can
make. In order of increasing cost: 1.Turn off your router when you
arent using it. 2.Use only wired connections. Disable the wireless
access point. All wireless routers have at least a couple of wired
LAN inputs. 3.Dont share sensitive files across the network. Dont
use shared disk drives or folders. 4.Update your wireless adapter
to one that can use a better security method.
Slide 42
Wireless Router Security References 1.Wikipedia articles on
WEP, WPA, Wireless Security, Wi-Fi Protected Access and the IEEE
802.11 standard 2.The Home WLAN website at
http://www.home-wlan.com/WEP-vs-
WPA.htmlhttp://www.home-wlan.com/WEP-vs- WPA.html 3.Applied
Cryptography, 2 nd edition, by Bruce Schneier, Wiley & Sons,
1996 4.Principles of Communication: Systems, Modulation and Noise,
Ziemer and Tranter, Houghton Mifflin, 1976 5.Institute of
Electrical and Electronic Engineers (IEEE) Wireless Network
Standard 802.11 6.Networking Bible, Barrie Sosinsky, Wiley, 2009
7.Cryptography Engineering, Nies Ferguson, Bruce Schneier,
Tadayoshi Kohno, Wiley Publishing, 2010
Wireless Router Security 2.4 GHz Channels Spread Spectrum
modulation causes the radio energy to spread across several
channels. Due to the high frequency, short distance, this is
usually not a problem You can select a set of non-overlapping
channels when you have several routers The most common is channels
1, 6 and 11 as shown here. In North America, only channels 1-11 are
used