13.01.2013 Views

Dummies, Wireless

Dummies, Wireless

Dummies, Wireless

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 9: Securing Your <strong>Wireless</strong> Home Network<br />

or make your network hard to use. All that’s required is the motivation to<br />

spend a few minutes (after you have everything up and working) battening<br />

down the hatches and getting ready for sea. (Can you tell that Pat used to be<br />

in the Navy?)<br />

The key steps in securing your wireless network, as we see them, are the following:<br />

1. Change all the default values on your network.<br />

2. Enable WPA.<br />

3. Close your network to outsiders (if your access point supports this).<br />

In Chapter 16 we talk about using a virtual private network (VPN) to secure<br />

your wireless connection when you’re away from home and when using<br />

public Wi-Fi hot spots. A virtual private network encrypts all the data that<br />

you send and receive through your computer’s network connection by creating<br />

a secure and encrypted network tunnel that runs from your computer to<br />

an Internet gateway (which could be in your office’s network or run by a service<br />

provider on the Internet). If you really wanted to be as secure as possible,<br />

you could use a VPN from a service provider such as Witopia (www.<br />

witopia.net) to encrypt your traffic at home too. The added benefit of a VPN,<br />

beyond security, is anonymity. To folks on the Internet, you will “look” like<br />

you’re surfing the Internet from that Internet gateway and not your home —<br />

which makes it harder for folks to track your comings and goings on the<br />

Internet. A VPN isn’t required to have a secure Wi-Fi network, but if you have<br />

one and your WEP or WPA security is broken by a bad guy, your communications<br />

will be secured by another layer of encryption.<br />

Hundreds of different access points and network adapters are available. Each<br />

has its own unique configuration software. (At least each vendor does; and<br />

often different models from the same vendor have different configuration systems.)<br />

You need to RTFM (Read the Fine Manual!). We give you some generic<br />

advice on what to do here, but you really, really, really need to pick up the<br />

manual and read it before you enable security on your network. Every vendor<br />

has slightly different terminology and different ways of doing things. If you<br />

mess up, you may temporarily lose wireless access to your access point. (You<br />

should still be able to plug in a computer with an Ethernet cable to gain<br />

access to the configuration system.) You may even have to reset your access<br />

point and start over from scratch. Follow the vendor’s directions (as painful<br />

at that may be). We tell you the main steps you need to take to secure your<br />

network; your manual gives you the exact line-by-line directions on how to<br />

implement these steps on your equipment.<br />

Most access points also have some wired connections available — Ethernet<br />

ports you can use to connect your computer to the access point. You can<br />

almost always use this wired connection to run the access point configuration<br />

software. When you’re setting up security, we recommend making a<br />

169

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!