13.01.2013 Views

Wireless Home Networking - Index of

Wireless Home Networking - Index of

Wireless Home Networking - Index of

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

168<br />

Part III: Installing a <strong>Wireless</strong> Network<br />

WPA2 is also known as 802.11i. 802.11i is simply the IEEE (the folks who make<br />

the standards for wireless LANs) standard for advanced Wi-Fi security. WPA<br />

was a step toward 802.11i set by the Wi-Fi Alliance. WPA2 incorporates all the<br />

security measures included in 802.11i.<br />

What’s better about WPA?<br />

� More random encryption techniques: WPA has basically been designed<br />

as an answer for all the current weaknesses <strong>of</strong> WEP, with significantly<br />

increased encryption techniques. One <strong>of</strong> WEP’s fatal flaws is that because<br />

its encryption isn’t sufficiently random, an observer can more easily find<br />

patterns and break the encryption. WPA’s encryption techniques are<br />

more random — and thus harder to break.<br />

� Automatic key changes: WPA also has a huge security advantage in the<br />

fact that it automatically changes the key (although you, as a user, get to<br />

keep using the same password to access the system). So, by the time a<br />

bad guy has figured out your key, your system has already moved on to<br />

a new one.<br />

It’s possible to use an 802.1x system, as described in the sidebar “802.1x:<br />

The corporate solution,” later in this chapter, to provide automatic<br />

key changes for WEP systems. This is not something you would find in<br />

anyone’s home network, but some businesses use it, and it does indeed<br />

minimize the effect <strong>of</strong> WEP’s fixed keys.<br />

� More user friendly: WPA is easier for consumers to use because there’s<br />

no hexadecimal stuff to deal with — just a plain text password. The idea<br />

is to make WPA much easier to deal with than WEP, which takes a bit <strong>of</strong><br />

effort to get up and running (depending on how good your access point’s<br />

configuration s<strong>of</strong>tware is).<br />

The type <strong>of</strong> WPA (and WPA2) we’re talking about here is <strong>of</strong>ten called WPA<br />

Personal or WPA PSK (preshared key). The more complex (and not suitable<br />

for the home) version <strong>of</strong> WPA/WPA2 that is <strong>of</strong>ten used by businesses is WPA<br />

Enterprise. We talk about WPA Enterprise in the sidebar titled “802.1x: The<br />

corporate solution.”<br />

Clamping Down on Your <strong>Wireless</strong><br />

<strong>Home</strong> Network’s Security<br />

Well, that’s enough <strong>of</strong> the theory and background, if you’ve read from the<br />

beginning <strong>of</strong> this chapter. It’s time to get down to business. In this section,<br />

we discuss some <strong>of</strong> the key steps you should take to secure your wireless<br />

network from intruders. None <strong>of</strong> these steps is difficult, will drive you crazy,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!