wireless router security who am i? tom tirrell bsee computer engineering, uofm ann arbor msee...

Download Wireless Router Security Who Am I? Tom Tirrell BSEE Computer Engineering, UofM Ann Arbor MSEE Computer Engineering/Communication Theory, Wayne State, Detroit

If you can't read please download the document

Upload: job-lynch

Post on 22-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

  • Slide 1
  • Wireless Router Security Who Am I? Tom Tirrell BSEE Computer Engineering, UofM Ann Arbor MSEE Computer Engineering/Communication Theory, Wayne State, Detroit Applications of computers in industry was my profession Networking computers is my hobby Email: [email protected]
  • Slide 2
  • Wireless Router Security Home Wireless Networks Or What I Wont be Talking about Today Network Interface Modem Wireless Router Signal from ISP Satellite Radio Fiber Optic Cable Co-axial Cable Outside Box Satellite Dish I3812 NID (fiber) Green Metal Box NID to Modem wires Coax Telephone wire 2-Wire Modem/Router Cable Modem Telephone Modem LAN Cable
  • Slide 3
  • Wireless Router Security Home Wireless Networks Part 2 Or What I will be Talking About Today 2-Wire Modem/Router Wireless Router
  • Slide 4
  • Wireless Router Security An inSSIDer view of Wireless Networks
  • Slide 5
  • Wireless Router inSecurity An inSSIDer view of Wireless Networks
  • Slide 6
  • Wireless Router inSecurity This House is Unlocked
  • Slide 7
  • Wireless Router Security Authentication Protocols Open not an option, anyone can connect Shared one step up from really bad, requires a key to log on WEP Fair, better than nothing, but gone in 60 seconds WPA Better, still has similar weaknesses as WEP WPA2 Best, state of the art, for now
  • Slide 8
  • Wireless Router Security Five Necessary Steps and One Cool Idea Go to the router configuration page in your browser: 192.168.xxx.xxx 1.Set a unique password for router configuration. 2.Set a unique Network Name (SSID) 3.Set Security or Authentication Type to WPA2-Personal(PSK)-AES 4.Set a unique Key as large as is convenient. 5.Disable Wi-Fi Protected Setup (WPS) 6.Disable SSID Broadcast
  • Slide 9
  • Wireless Router Security There is a tradeoff between compatibility, convenience and levels of security. There is no tradeoff between whether or not to use security. Even older and less secure methods are better than no security at all. Modern methods of encryption may not be compatible with older devices. Check the manuals on your network devices to see what levels of security they can use. Select the highest security level that you can and then see if all the devices on your network can still connect. If not, back down a level until everything works. The Tradeoff
  • Slide 10
  • Wireless Router Security Linksys WRT54g Wireless Router You can download manuals for Linksys/Cisco routers at this URL: http://www6.nohold.net/Cisco2/ukp. aspx?pid=80&vw=1&articleid=22501
  • Slide 11
  • Wireless Router Security Linksys WRT54g Wireless Router In your browser, go to 192.168.1.1
  • Slide 12
  • Wireless Router Security Linksys WRT54g Wireless Router You will be asked for a User Name and Password. If you know what they are, enter them now. If you dont know it, try the default user name and password which are: Default User Name : blank Default Password: admin
  • Slide 13
  • Wireless Router Security Linksys WRT54g Wireless Router If none of these work, press the reset button on the back of the router.
  • Slide 14
  • Wireless Router Security Linksys WRT54g Wireless Router
  • Slide 15
  • Disable Wi-Fi Protected Setup (WPS)
  • Slide 16
  • Linksys WRT54g Wireless Router Network Name (SSID)
  • Slide 17
  • Linksys WRT54g Wireless Router Network Name (SSID)
  • Slide 18
  • Linksys WRT54g Wireless Router Security Mode
  • Slide 19
  • Linksys WRT54g Wireless Router Encryption
  • Slide 20
  • Linksys WRT54g Wireless Router Passphrase/Wireless Key
  • Slide 21
  • Linksys WRT54g Wireless Router Router Password
  • Slide 22
  • Wireless Router Security ATT 2-Wire Router Configuration In your browser, go to 192.168.1.254
  • Slide 23
  • ATT 2-Wire Router Configuration Router Configuration Web Page
  • Slide 24
  • ATT 2-Wire Router Configuration Wi-Fi Protected Setup??
  • Slide 25
  • ATT 2-Wire Router Configuration Saving Settings, system Password.
  • Slide 26
  • ATT 2-Wire Router Configuration Default System Password
  • Slide 27
  • ATT 2-Wire Router Configuration System Password Failed!
  • Slide 28
  • ATT 2-Wire Router Configuration Password Hint
  • Slide 29
  • ATT 2-Wire Router Configuration Resetting You System Password
  • Slide 30
  • ATT 2-Wire Router Configuration Password Accepted, Configuration Saved
  • Slide 31
  • Wireless Router Security Network Name (SSID)
  • Slide 32
  • Wireless Router Security SSID Broadcast
  • Slide 33
  • ATT 2-Wire Router Configuration Enable Wireless Security
  • Slide 34
  • ATT 2-Wire Router Configuration Authentication/Encryption Type
  • Slide 35
  • ATT 2-Wire Router Configuration Wireless Key
  • Slide 36
  • ATT 2-Wire Router Configuration Wireless Key
  • Slide 37
  • ATT 2-Wire Router Configuration Save Your Settings
  • Slide 38
  • Wireless Router Security SSID Broadcasting Disabled
  • Slide 39
  • Wireless Router Security SSID Broadcasting Disabled
  • Slide 40
  • Wireless Router Security SSID Broadcasting Disabled
  • Slide 41
  • Wireless Router Security I Cant Do this! If you cant secure your network as described above, there are still choices you can make. In order of increasing cost: 1.Turn off your router when you arent using it. 2.Use only wired connections. Disable the wireless access point. All wireless routers have at least a couple of wired LAN inputs. 3.Dont share sensitive files across the network. Dont use shared disk drives or folders. 4.Update your wireless adapter to one that can use a better security method.
  • Slide 42
  • Wireless Router Security References 1.Wikipedia articles on WEP, WPA, Wireless Security, Wi-Fi Protected Access and the IEEE 802.11 standard 2.The Home WLAN website at http://www.home-wlan.com/WEP-vs- WPA.htmlhttp://www.home-wlan.com/WEP-vs- WPA.html 3.Applied Cryptography, 2 nd edition, by Bruce Schneier, Wiley & Sons, 1996 4.Principles of Communication: Systems, Modulation and Noise, Ziemer and Tranter, Houghton Mifflin, 1976 5.Institute of Electrical and Electronic Engineers (IEEE) Wireless Network Standard 802.11 6.Networking Bible, Barrie Sosinsky, Wiley, 2009 7.Cryptography Engineering, Nies Ferguson, Bruce Schneier, Tadayoshi Kohno, Wiley Publishing, 2010
  • Slide 43
  • Wireless Router Security Wireless Modes 802.11 network standards 802.11 protocol Release [6] [6] Freq. (GHz) Bandwidth (MHz) Data rate Data rate per stream (Mbit/s) [7] [7] Allowable MIMO streams MIMO Modulation Approximate indoor range [citation needed]citation needed Approximate outdoor range [citation needed]citation needed (m)(ft)(m)(ft) Jun 19972.4201, 21DSSSDSSS, FHSSFHSS2066100330 aSep 1999 5 20 6, 9, 12, 18, 24, 36, 48, 54 1OFDM 35115120390 3.7 [A] [A] 5,00016,000 [A] [A] bSep 19992.4205.5, 111DSSS35115140460 gJun 20032.420 6, 9, 12, 18, 24, 36, 48, 54 1 OFDMOFDM, DSSS DSSS 38125140460 nOct 20092.4/5 20 7.2, 14.4, 21.7, 28.9, 43.3, 57.8, 65, 72.2 [B] [B] 4OFDM 70230250820 [8] [8] 40 15, 30, 45, 60, 90, 120, 135, 150 [B] [B] 70230250820 [8 [8
  • Slide 44
  • Wireless Router Security 2.4 GHz Channels Spread Spectrum modulation causes the radio energy to spread across several channels. Due to the high frequency, short distance, this is usually not a problem You can select a set of non-overlapping channels when you have several routers The most common is channels 1, 6 and 11 as shown here. In North America, only channels 1-11 are used