Go Back  PPRuNe Forums > Misc. Forums > Computer/Internet Issues & Troubleshooting
Reload this Page >

How do I secure a wireless network?

Wikiposts
Search
Computer/Internet Issues & Troubleshooting Anyone with questions about the terribly complex world of computers or the internet should try here. NOT FOR REPORTING ISSUES WITH PPRuNe FORUMS! Please use the subforum "PPRuNe Problems or Queries."

How do I secure a wireless network?

Thread Tools
 
Search this Thread
 
Old 27th Dec 2007, 06:03
  #1 (permalink)  

Just Binos
Thread Starter
 
Join Date: Oct 2000
Location: Mackay, Australia
Age: 71
Posts: 1,397
Likes: 0
Received 0 Likes on 0 Posts
How do I secure a wireless network?

Due to way above average usage of my download limit I suspect somebody is helping themselves to my connection. The computer does warn me occasionally that my system is unprotected but I've ignored it so far just because I don't know how to do anything about it.

Basic steps to start with please? I haven't put in any details about my system because I don't know what info you would need.
Binoculars is offline  
Old 27th Dec 2007, 06:46
  #2 (permalink)  
 
Join Date: Aug 2007
Location: uk
Posts: 12
Likes: 0
Received 0 Likes on 0 Posts
Hi, dont know what wireless modem you are using, but the first thing to do is restrict the access to the router to the computers you want by entering their MAC identity into the router, i did this after i found a neighbour was accessing my wireless, you should be able to tell who is connected to your router in the routers set up, mine is in advanced, wireless management.

I am using a D link 604 router.
berliner57 is offline  
Old 27th Dec 2007, 07:31
  #3 (permalink)  
More bang for your buck
 
Join Date: Nov 2005
Location: land of the clanger
Age: 82
Posts: 3,512
Likes: 0
Received 0 Likes on 0 Posts
Binos read this thread it may help http://www.pprune.org/forums/showthr...light=networks
green granite is offline  
Old 27th Dec 2007, 07:42
  #4 (permalink)  

Just Binos
Thread Starter
 
Join Date: Oct 2000
Location: Mackay, Australia
Age: 71
Posts: 1,397
Likes: 0
Received 0 Likes on 0 Posts
Did you get all of that Max?

Not all of it, chief.

Which part didn't you get, Max?

The part after "Hi"...............

Actually not quite that bad; as it happens I am using the same router, and I'm in the page you mentioned, but how do I get the MAC address, whatever that is? I assume I have to tick the box "Enable Access List"?
Earlier in the setup process, (HOME-WIRELESS) the first page to appear is Wireless settings. I have ticked Enable AP. The SSID there is DLINK, and Security currently is None. I select WPA and another box comes up written in Swahili asking about things called radius servers and pre-shared keys. Que? I applied my usual approach to things I don't understand and ignored it then tried to Apply the new settings, only to be told I had an incorrect IP address.
Do I have to change these settings as well?

Crossed posts; thanks GG, I'll scrutinise it with an intense scrute.
Binoculars is offline  
Old 27th Dec 2007, 08:40
  #5 (permalink)  
Per Ardua ad Astraeus
 
Join Date: Mar 2000
Location: UK
Posts: 18,579
Likes: 0
Received 0 Likes on 0 Posts
Assuming Windows XP???, Click on Run (Start panel), type CMD, then ipconfig /all (note space) into black box and the MAC for your wireless card/dongle/etc will be shown under 'Physical address'. Not familiar with your router but that is the MAC you need to 'enable' (somewhere!)

Good luck - I found it a black art, but I got there
BOAC is offline  
Old 27th Dec 2007, 08:57
  #6 (permalink)  
Ecce Homo! Loquitur...
 
Join Date: Jul 2000
Location: Peripatetic
Posts: 17,495
Received 1,640 Likes on 751 Posts
Binos, follow this idiots guide.
ORAC is offline  
Old 27th Dec 2007, 09:08
  #7 (permalink)  
Per Ardua ad Astraeus
 
Join Date: Mar 2000
Location: UK
Posts: 18,579
Likes: 0
Received 0 Likes on 0 Posts
...which triggers the thought.... IP addresses and WEP can be 'sniffed' via packets. MAC addresses also?
BOAC is offline  
Old 27th Dec 2007, 10:08
  #8 (permalink)  

Just Binos
Thread Starter
 
Join Date: Oct 2000
Location: Mackay, Australia
Age: 71
Posts: 1,397
Likes: 0
Received 0 Likes on 0 Posts
Thank you all. GG's link assumed a bottom line of knowledge a couple of rungs above mine. Orac's link looks more promising. I"ll check it out and let you know how I go.

For info, the original connection was to a Mac desktop, the network computers are a Macbook and an XP laptop.
Binoculars is offline  
Old 27th Dec 2007, 10:14
  #9 (permalink)  
 
Join Date: Aug 2002
Location: Surrey, UK.
Posts: 0
Likes: 0
Received 0 Likes on 0 Posts
Originally Posted by BOAC
...which triggers the thought.... IP addreses and WEP can be 'sniffed' via packets. MAC addresses also?
Yes. MAC addresses are easily got hold of.

MAC spoofing is fairly straightforward too.

What MAC filtering does do though is limit the amount of "accidental" connections - if someone wants to use your MAC-restricted connection they have to purposefully spoof a valid MAC address (which they easily get by sniffing your data)
rustle is offline  
Old 27th Dec 2007, 11:07
  #10 (permalink)  
Per Ardua ad Astraeus
 
Join Date: Mar 2000
Location: UK
Posts: 18,579
Likes: 0
Received 0 Likes on 0 Posts
Thanks, Rustle, so is WPA the only safe way to protect or is that crackable too?
BOAC is offline  
Old 27th Dec 2007, 12:19
  #11 (permalink)  
bnt
 
Join Date: Feb 2007
Location: Dublin, Ireland. (No, I just live here.)
Posts: 733
Received 6 Likes on 5 Posts
Originally Posted by BOAC
...which triggers the thought.... IP addresses and WEP can be 'sniffed' via packets. MAC addresses also?
To sniff IP and MAC addresses, you need to be "on" the wireless network in the first place, which can be done if you use no wireless security, or weak WEP security. That's why I'd recommend using WPA encryption instead, if you can. Unless you have the WPA key, it's like having the cable unplugged - sniffing tricks aren't possible. I could never say it's perfectly secure - that would be daft - but I'm not aware of any exploitable holes.
bnt is offline  
Old 27th Dec 2007, 21:58
  #12 (permalink)  
 
Join Date: Jan 2004
Location: Hiding..... in one hemisphere or another
Posts: 1,067
Received 1 Like on 1 Post
Found a little site a while ago that peeps may find useful:

http://www.auditmypc.com/firewall-test.asp
Atlas Shrugged is offline  
Old 28th Dec 2007, 03:15
  #13 (permalink)  
 
Join Date: Dec 1998
Location: Escapee from Ultima Thule
Posts: 4,273
Received 2 Likes on 2 Posts
Some bits & pieces that might help:

Every network card has its own unique serial number, called its MAC address (Media Access Control address). To connect onto a network it must have a unique network address assigned to that MAC address. This can be done 'on the fly' for a limited duration as the card tries to connect to the network using a protocol called Dynamic Host Control Protocol (DHCP) or it can be permanently set within the network. Somewhere in the network there needs to be a device that controls such things for DHCP *or* each machine must be told what its address will be. DHCP is what is used for ad-hoc connections because it is convenient & requires little intervention from the user.

Think 'plug the wire into one network card, plug the other end into the network controller and the two will talk to each other. The DHCP host listens for a request for an address from each network card (ie MAC) that is connected, assigns a unique network address ('IP' eg 192.168.1.1) to each MAC & keeps track of them'. The machines are now capable of talking to each other. It could be via a wired network, or via a wireless network. Each device is *supposed* to only listen for data tagged with its own address.

If the network uses only wires then it's more difficult to tap in to it compared to a wireless network. Some network machines (switches) will only send the data down the wire that is connected to the MAC/IP combination. Other systems broadcast the tagged data packets down all the wires & each device grabs whatever packets are tagged with their address. Even a broadcast system is limited to the machines that have been plugged in.

A wireless connection is more akin to a wired but broadcast system but one where anyone can 'plug in' at anytime. This leads to the problems of how a wireless network can announce itself and how a device can connect and be uniquely identified while preventing unwanted devices to connect - hence the encryption methods WEP & later, WPA.

WEP has a flaw in its design that causes it to require each device to broadcast enough information that over time a nefarious person can reconstruct the encryption key that's being used to keep others out and join the network.

WPA uses a different method & also a key that is longer and therefore more difficult to calculate.

Some things that you can do to secure the wireless network:

1. Don't have the network announce itself. To the casual user, an un-announced network is invisible although not to those with the correct tools. In your WiFi router you need to switch off the function that announces the network name. In your PC you'll need to tell it what network name to connect to

2. Use WPA instead of WEP. Use the longest key that all machines you want on the network can use.

3. Limit the network connections to *specific* machines ie MACs. This facility is built into the WiFi router.

4. Some WiFi routers have directional antenna or allow you to reduce the signal strength. The worse the signal that escapes your building the more difficult for someone to eavesdrop.

5. Use a wired network...
Tinstaafl is offline  
Old 28th Dec 2007, 08:45
  #14 (permalink)  
Red On, Green On
 
Join Date: May 2004
Location: Between the woods and the water
Age: 24
Posts: 6,487
Likes: 0
Received 2 Likes on 2 Posts
6. Live at least 200m from your nearest neighbour
airborne_artist is offline  
Old 30th Dec 2007, 17:30
  #15 (permalink)  
 
Join Date: Nov 2005
Location: Taiwan
Posts: 27
Likes: 0
Received 0 Likes on 0 Posts
7. Better make that >10km

http://wok-fi.com/info.html
makintw is offline  
Old 1st Jan 2008, 08:45
  #16 (permalink)  
 
Join Date: Jun 2003
Location: EuroGA.org
Posts: 13,787
Likes: 0
Received 0 Likes on 0 Posts
1. Don't have the network announce itself. To the casual user, an un-announced network is invisible although not to those with the correct tools. In your WiFi router you need to switch off the function that announces the network name. In your PC you'll need to tell it what network name to connect to
Unfortunately this one, also called "SSID broadcast disabled", introduces a load of compatibility problems with many devices, even the most modern ones.

Out of my collection of wifi PDAs, laptops, etc, about 30% will connect and the rest won't. Some laptops connect only following a reboot.

Always enable SSID broadcast initially and only when everything is working (with the desired encryption mode e.g. WPA) turn off SSID, and see if it still works.

I don't think there is any way to hack WPA so there should be no harm in having the SSID broadcast enabled.

I would also avoid a common thing which is setting the access point name to one's house name or street number - why do people do that?? It just tells everybody where to go to get a better signal I set mine to something like "f**k off" Great fun until you have a guest who wants to use their laptop

Otherwise, I agree about a wired network. 100% compatible, much faster, cannot be hacked into (well other than by GCHQ using Van Eck etc).
IO540 is offline  
Old 1st Jan 2008, 10:27
  #17 (permalink)  
Per Ardua ad Astraeus
 
Join Date: Mar 2000
Location: UK
Posts: 18,579
Likes: 0
Received 0 Likes on 0 Posts
Originally Posted by IO540
Some laptops connect only following a reboot.
- I'm relieved to hear someone else has that problem - I thought it was just my inept wifi set up
BOAC is offline  
Old 1st Jan 2008, 11:21
  #18 (permalink)  
Spoon PPRuNerist & Mad Inistrator
 
Join Date: Sep 2003
Location: Twickenham, home of rugby
Posts: 7,402
Received 275 Likes on 175 Posts
Otherwise, I agree about a wired network. 100% compatible, much faster, cannot be hacked into (well other than by GCHQ using Van Eck etc).
For true security, fibre is the way to go - no EMR to be picked up and converted back to recover the electrical signal, and can't be tapped into without being discovered (provided you are looking).

But we are venturing into the realms of the paranoid here (i.e. government).

SD
Saab Dastard is offline  

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off



Contact Us - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service

Copyright © 2024 MH Sub I, LLC dba Internet Brands. All rights reserved. Use of this site indicates your consent to the Terms of Use.