16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 20<br />

Implementing Basic <strong>Wireless</strong> <strong>Security</strong><br />

Chris Hurley<br />

20.1 Introduction<br />

This chapter looks at how to configure the basic security settings on the four most popular<br />

access points currently deployed for wireless home use (Linksys WAP11, BEFW11SR,<br />

and WRT54G, and the D-Link DI-624). It covers the practical steps for implementing<br />

wireless security for home systems.<br />

There are four very simple steps that are sufficient for most home users:<br />

1. Use a unique Service Set Identifier (SSID).<br />

2. Disable SSID broadcast.<br />

3. Enable Wired Equivalent Privacy (WEP) encryption.<br />

4. Filter access by Media Access Control (MAC) address.<br />

20.2 Enabling <strong>Security</strong> Features on a Linksys WAP11 802.11 b<br />

Access Point<br />

The Linksys <strong>Wireless</strong> Access Point (WAP) 11 802.11b access point was one of the first<br />

access points deployed by a large number of people. The WAP11 was the wireless access<br />

point many users purchased that already had a home network with a router set up. The<br />

WAP11 requires a separate router in order to allow access to any non-wireless devices,<br />

to include Internet access. This section details the minimum steps you should take to<br />

configure the WAP11 securely. All of the steps outlined in this section should be done<br />

from a computer that is connected to your wired network. This is because as you make<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!