Monday, November 7, 2011

Wireless LAN Security with Ms.Windows

* Wireless LAN networks provide freedom of movement, but also require you to address security issues that are not as prevalent on a private cabling system for a wired LAN technology suck as Ethernet
* The main security issues =
- authentication of wireless clients
- confidentiality
- data integrity of wireless LAN frames.

That have 2 authentication on IEEE 802.11 Standard (WEP)
1. Open system authentication does not provide authentication. It provides identification using the wireless adapter's MAC address. Open system authentication is used when no authentication is required . (Free Access)
Process Open system authentication is

The authentication-initiating wireless client sends an IEEE 802.11 authentication management frame that contains its identity.
The receiving wireless AP checks the initiating station's identity and sends back an authentication verification frame.

2. Shared key authentication is not secure and is not recommended for use. It verifies that an authentication-initiating station has knowledge of a shared secret. This is similar to preshared key authentication for Internet Protocol security (IPSec). The 802.11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802.11. In practice, a user manually types this secret for the wireless AP and the wireless client.
Shared key Process is

The authentication-initiating wireless client sends a frame consisting of an identity assertion and a request for authentication.
The authenticating wireless node responds to the authentication-initiating wireless node with challenge text.
The authentication-initiating wireless node replies to the authenticating wireless node with the challenge text that is encrypted using WEP and an encryption key that is derived from the shared key authentication secret.
The authentication result is positive if the authenticating wireless node determines that the decrypted challenge text matches the challenge text originally sent in the second frame. The authenticating wireless node sends the authentication result.

This is recommended for campuses.

Authentication with IEEE 802.1X (WPA,WPA2)
*Elements of 802.1X
- port access entity
- Authenticator
- Supplicant
- Authentication Server

EAP (Extensible Authentication Protocol) Overview
- EAP Over RADIUS (server)

- IEEE 802.1X Authentication Process for EAP-TLS Process for EAP(Extensible Authentication Protocol)-TLS

Conclusion if u wanna get a full security on your wireless use WPA2, because this design for enterprise network and required a radius (server) authentication. but this setup is more complicated but provided additional security (Protection against dictionary attack)

For SEtup your Router security ,u may check your ip from ipconfig
( Click Ctrl + R (Run) > cmd > ipconfig )
Copy your Default Gateway n paste into your Web Browser address,then it will brought your to setup your router ...Just change your security from WEP to WPA for a higher security protection...

�-- navigation -->


Post a Comment

Acer (5) adobe photoshop (3) All Office Converter Platinum (1) Apple (3) Application (16) ASCII Art Generator (1) Ashampoo ClipFisher (1) audio (4) Backlinks by doing it right Ping (1) beauty retouch mode (1) blackberry (4) Blogger (1) Circle Dock (1) Computer (1) Converted (3) Copy DVD Gold (1) Coral Clock 3 (1) Corel Designer (1) Default BitDefender Total Security (1) designer (3) DiaryOne (1) Digital Cameras Panasonic DMC-ft 3 (1) DivX Pro 7 (1) Driver (2) Ducati (1) External hdd/ssd iosafe rugged portable (1) ferrari (4) Flash Decompiler Trillix (1) Folder Guard 8.0 (1) Folder Lock 6 (1) Forex (1) Frame Photo editor (1) Fresh UI 8.26 (1) gadget (10) game (13) Gps garmin (1) handphone (1) Helium Music Manager (1) intel pentium (4) Internet Music Capture (1) Internet tools (2) ipad (4) Laser pointer (1) LCD Monitor (1) Lock My PC 4 (1) Matrix (1) Mediachance Dynamic (1) mercedes (3) Mobile (1) Mp3 player exeze wmr (1) Natura Sound Therapy 3 (1) Netbook (2) Panasonic camera (1) Passware Kit 8 Enterprise (1) Photo HDRi (1) Photodex ProShow Gol (1) PhotoInstrument 2 (1) Portable Everest Ultimate 5 (1) Portable Trojan Remover (1) programs (3) Radio Recorder (1) Rapid Hacker (1) Rating ipx8 mil-std (1) samsung (3) Seo (2) Software (11) SoundPackager (1) SoundVista (1) SRS Audio Sandbox (1) Technology Computer Giant IMB (1) Technology Industry (2) Teleport Pro (1) tips and trik (5) Toolkit (5) USB (2) windows xp (6) Wireless Lan Security with Ms.Windows (1) Xilisoft Audio Maker 3 (1) Xion Audio Player (1)

Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Buy Printable Coupons