13.01.2013 Views

Wireless Home Networking - Index of

Wireless Home Networking - Index of

Wireless Home Networking - Index of

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 9: Securing Your <strong>Wireless</strong> <strong>Home</strong> Network<br />

Going for the Ultimate in Security<br />

Setting up your network with WPA security keeps all but the most determined<br />

and capable crackers out <strong>of</strong> your network and prevents them from doing<br />

anything with the data you sent across the airwaves (because this data is<br />

securely encrypted and appears to be just gibberish).<br />

But WPA has a weakness, at least the way it’s most <strong>of</strong>ten used in the home:<br />

the preshared key (your shared secret or passphrase) that allows users to<br />

connect to your network and that unlocks your WPA encryption.<br />

Your preshared key can be vulnerable in two ways:<br />

� If it’s not sufficiently difficult to guess (perhaps you used the same<br />

word for your passphrase as you used for your network’s ESSID): You<br />

would be shocked by how many people do that! Always try to use a<br />

passphrase that combines letters (upper- and lowercase is best) and<br />

numbers and doesn’t use simple words from the dictionary.<br />

� If you’ve given it to someone to access your network and then they<br />

give it to someone else: For most home users, this isn’t a big deal, but if<br />

you’re providing access to a large number <strong>of</strong> people (maybe you’ve set<br />

up a hot spot), it’s hard to put the genie back in the bottle when you’ve<br />

given out the passphrase.<br />

802.1x: The corporate solution<br />

Another new standard that’s become quite popular<br />

in the corporate Wi-Fi world is 802.1x. This<br />

isn’t an encryption system but, rather, an authentication<br />

system. An 802.1x system, when built into<br />

an access point, allows users to connect to the<br />

access point and gives them only extremely limited<br />

access (at least initially). In an 802.1x system,<br />

the user could connect to only a single network<br />

port (or service). Specifically, the only traffic the<br />

user could send over the network is your login<br />

information, which is sent to an authentication<br />

server that would exchange information (such as<br />

passwords and encrypted keys) with the user to<br />

establish that he or she was allowed on the network.<br />

After this authentication process has been<br />

satisfactorily completed, the user is given full<br />

access (or partial access, depending on what<br />

policies the authentication server has recorded<br />

for the user) to the network.<br />

177

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!