in black and white
Main menu
Share a book About us Home
Biology Business Chemistry Computers Culture Economics Fiction Games Guide History Management Mathematical Medicine Mental Fitnes Physics Psychology Scince Sport Technics

wireles network hacks mods - briere D.

briere D. wireles network hacks mods - Wiley publishing, 2005. - 387 p.
ISBN: 0-7645-9583-0
Download (direct link): wirelesnetworkhacks.pdf
Previous << 1 .. 61 62 63 64 65 66 < 67 > 68 69 70 71 72 73 .. 87 >> Next

WSC Guard WokxMM to WSC Uudnl1
WSC Guard povdes the тэя powerful. smpfetouse, ani coe-rfectwe setterfor secuna vox мтга netware
Ode on Sfon My Wide» Nrfwmk to лай yo r PRFF tml ard prcren yaг ягпгяа netwok usng we rdians -erengih seejty of Wl-fi Protected fcccta (WPA)
S9CUC My I Qrit пз bjilor. f ycu would Ike to crolect your i
Wreteis Ketvwrv I access pent or tcUer nth WSC Guard
Comect tc Secued Gtck na bJttor f >xxj would Ike to connect to a access
Wre«ss Несяак netn»34 that is atesdy protecleC by WSC Qusd
____Cancel____________| Скк эта олег t >cti do ny. wart :o dc etne- черпак
____Do not snow tm message agair
One potential pitfall for hosted 802.1X services is that these services are directly reliant upon the reliability of your Internet connection. If your DSL or cable modem goes down, you lose your connection to the 802.1X server. And when this happens, your clients can’t remain connected to the access point — they won’t have a current key or authorization when the 802.1X authorization “times out” (usually in a matter of a few minutes).
WSC Guard provides a bit of software to protect against this — it reverts to the WPA PSK method of encryption if the Internet connection goes down. WiTopia’s service doesn’t provide this backup. If you’re using your network primarily for Internet sharing (and not for computer-to-computer communications within the LAN), this really isn’t a problem. If you do a lot of intra-LAN communicating, spending the extra money for WSC’s service might be worthwhile, just because of this fallback position.
144 Part II: Boosting Performance on Your Wireless Network
Figure 8-4:
Controlling your network access with SecureMy WiFi.
AP Manufacturer
• Apple
p r i m
Ciit a Shihi
AirPort Express | Inip | | Change | 1 Data» |
aP-600 | Inip | | Change | | Data» |
WRT54GS | Inip | | Change | | Data* |
ap 1200 [ Inip | | Change ] | Delete |
Dl 624 1 Into | | Change | [ Dalala |
steved>w0010020 XXXXXXX Change
tara$w0010020 XXXXXXX Change [ Delete J
burakflwO010020 XXXXXXXX Change Delete J
blll'SVwO010020 xxxxxxxx Change j Delete |
available XXXXXXXX [Add]
available xxxxxxxx Aon
available xxxxxxxx *■*
available xxxxxxxx Ac cl
available xxxxxxxx Add
available xxxxxxxx Add .
available xxxxxxxx Add .
available xxxxxxxx Add
available xxxxxxxx Add
available xxxxxxxx Add
available xxxxxxxx Add
available xxxxxxxx Add
available xxxxxxxx Add
available xxxxxxxx , Ad d '
available xxxxxxxx ' Add '
Setting up an AP
To get set up with a hosted authentication service, you’ll need to take a few steps.
You need WPA-Enterprise/802.1X-compliant access points and client hardware/ software. Check the Web sites of your preferred service provider for their hardware and software recommendations.
1. First, set up an account with your preferred service provider.
We talk about a few you might want to check out in the next section.
Chapter 8: Staying Safe in the Wireless World 145
Keep in mind that you might need to set up your account a day or so in advance of actually using the authentication service — it can take that long for all of the certificates to get set up and issued.
2. Print out the usernames, passwords/shared secrets, and certificates that you receive by e-mail from your hosted service provider and keep the hard copy someplace safe.
You may also receive a download link for client software that acts as the 802.1X supplicant and may also help you set up your access point.
3. Select the Security tab within your AP’s Web configuration page (you’ll usually find this at or at a similar IP address).
4. Turn on the encryption by selecting WPA RADIUS or WPA ENTERPRISE or something similar (it varies by AP vendor).
5. Select TKIP for the encryption protocol.
6. Enter your service’s RADIUS server host name (like radius.service or IP address, and port number (like 1812) in the RADIUS Server Address and Port boxes.
7. Cut and paste the shared secret or key from the e-mail you got from the service provider — this will usually be the public key for your authentication certificate of your service.
8. Save your setting and exit the configuration page.
Typically this reboots your AP and resets all connections.
The instructions above are purposely generic. Your own AP will have its own specific screens and steps to follow, but they should be similar to the ones we describe. Keep in mind that some services, like Wireless Security Corp’s WSC Guard, include client software that not only sets up your computers, but also handles the AP configuration for you.
Setting up a client
After you’ve configured your AP, you need to go to each PC or device in your network and configure the supplicant software on each for your service’s specific EAP type.
For example, for Windows XP computers, follow something similar to the following steps:
1. Open Windows XP Wireless Zero Config by right-clicking its icon in the system tray and selecting View Available Networks.
Previous << 1 .. 61 62 63 64 65 66 < 67 > 68 69 70 71 72 73 .. 87 >> Next