Chapter 6 Wireless
VMG1312-T10C User’s Guide
75
ensure that only authorized people can use a wireless data network, or understand the data carried
on it.
These security standards do two things. First, they authenticate. This means that only people
presenting the right credentials (often a username and password, or a “key” phrase) can access the
network. Second, they encrypt. This means that the information sent over the air is encoded. Only
people with the code key can understand the information, and only people who have been
authenticated are given the code key.
These security standards vary in effectiveness. Some can be broken, such as the old Wired
Equivalent Protocol (WEP). Using WEP is better than using no security at all, but it will not keep a
determined attacker out. Other security standards are secure in themselves but can be broken if a
user does not use them properly. For example, the WPA-PSK security standard is very secure if you
use a long key which is difficult for an attacker’s software to guess - for example, a twenty-letter
long string of apparently random numbers and letters - but it is not very secure if you use a short
key which is very easy to guess - for example, a three-letter word from the dictionary.
Because of the damage that can be done by a malicious attacker, it’s not just people who have
sensitive information on their network who should use security. Everybody who uses any wireless
network should ensure that effective security is in place.
A good way to come up with effective security keys, passwords and so on is to use obscure
information that you personally will easily remember, and to enter it in a way that appears random
and does not include real words. For example, if your mother owns a 1970 Dodge Challenger and
her favorite movie is Vanishing Point (which you know was made in 1971) you could use
“70dodchal71vanpoi” as your security key.
The following sections introduce different types of wireless security you can set up in the wireless
network.
6.10.2.1 SSID
Normally, the Device acts like a beacon and regularly broadcasts the SSID in the area. You can hide
the SSID instead, in which case the Device does not broadcast the SSID. In addition, you should
change the default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized wireless
devices to get the SSID. In addition, unauthorized wireless devices can still see the information that
is sent in the wireless network.
6.10.2.2 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to use the wireless
network. You can make every user log in to the wireless network before using it. However, every
device in the wireless network has to support IEEE 802.1x to do this.
For wireless networks, you can store the user names and passwords for each user in a RADIUS
server. This is a server used in businesses more than in homes. If you do not have a RADIUS server,
you cannot set up user names and passwords for your users.
Unauthorized wireless devices can still see the information that is sent in the wireless network,
even if they cannot use the wireless network. Furthermore, there are ways for unauthorized
wireless users to get a valid user name and password. Then, they can use that user name and
password to use the wireless network.
Summary of Contents for VMG1312-T10C
Page 4: ...Contents Overview VMG1312 T10C User s Guide 4 ...
Page 12: ...Table of Contents VMG1312 T10C User s Guide 12 ...
Page 13: ...13 PART I User s Guide ...
Page 14: ...14 ...
Page 20: ...Chapter 1 Introduction VMG1312 T10C User s Guide 20 ...
Page 28: ...28 ...
Page 34: ...Chapter 4 Connection Status and System Info VMG1312 T10C User s Guide 34 ...
Page 106: ...Chapter 7 Home Networking VMG1312 T10C User s Guide 112 ...
Page 144: ...Chapter 13 Filter VMG1312 T10C User s Guide 152 ...
Page 164: ...Chapter 15 Parental Control VMG1312 T10C User s Guide 172 ...
Page 172: ...Chapter 16 Certificates VMG1312 T10C User s Guide 180 ...
Page 178: ...Chapter 17 System Monitor VMG1312 T10C User s Guide 186 ...
Page 180: ...Chapter 18 User Account VMG1312 T10C User s Guide 188 ...
Page 184: ...Chapter 20 System VMG1312 T10C User s Guide 192 ...
Page 190: ...Chapter 22 Log Setting VMG1312 T10C User s Guide 198 ...
Page 196: ...Chapter 24 Backup Restore VMG1312 T10C User s Guide 204 ...
Page 214: ...Chapter 26 Diagnostic VMG1312 T10C User s Guide 222 ...
Page 232: ...Appendix B Legal Information VMG1312 T10C User s Guide 240 ...