Vantage Point Computing Security Manual Final
Vantage Point Computing Security Manual Final
Security Manual
- Linksys WRT54G2 Router [Wireless Security Set-Up]
ROUTER
1. Launch your Web Browser (Internet Explorer (IE) [Fig.1] or Firefox (FF) [Fig.2]) a. Enter the address: http://192.168.1.1 b. Press Enter on your keyboard, or click the green arrow.
Vantage Point Computing 2. A pop-up will ask for a User name and Password (Internet Explorer Users) a. Leave User name: blank [Fig.1a] b. For Password: enter admin [Fig.1b] Fig.1a IE User Name
Fig.1b IE Password
Vantage Point Computing (Firefox Users) a. Leave User Name: blank [Fig.2a] b. For Password: enter admin [Fig.2b]
Fig.2b FF Password
Vantage Point Computing 3.The Linksys Basic Setup page will display a. For Internet Connection Type choose Automatic Configuration -DHCP [Fig.3] b. For Router Name: pick a name for your router c. For DHCP Server: click Enable d. Click "Save" e. After settings are saved, click "Continue" Fig.3 Basic Setup Page
Vantage Point Computing 4. Select the Wireless Tab at the top of your screen [Fig.4] a. For Wireless Configuration: select Manual
b. After you select "Manual" new options will appear [Fig.5] Fig.5 New Wireless Options
c. For Wireless Network Mode: select Mixed from the dropdown menu. [Fig.6] Fig.6 Wireless Network Mode
d. For Wireless Network Name (SSID): type a name for your wireless network. [Fig.7] (Remember: This name should be something you will remember, but not something easily guessed by intruders) e. For Wireless SSID Broadcast: select Disable
f. For Wireless Channel: select 7 2.442Ghz [Fig.8] g. Click on Save Setting h. Click on Continue when you see page prompts Setting are successful. Fig.8 Wireless Channel
9. Click on the Wireless Security tab: [Fig.9] a. For Security Mode: select WPA Personal
b. After you select WPA Personal more options will appear [Fig.10] Fig.10 WPA Personal
c. For WPA Algorithms: select TKIP [Fig.11] d. For WPA Shared Key: type a password for your wireless network. This password can be letters or numbers. (For better security, we suggest 24 characters or longer.) [Fig.11] e. Click Save Setting f. Click Continue after saving. Fig.11 WPA Algorithms
g. Click on Continue after you see the Settings are successful window. [Fig.12] Fig. 12 Continue Screen
Vantage Point Computing 10. Click on the Administration tab. [Fig.13] a. Click on the Management tab b. For Password: type in a password for your router. (This password should be different from your network password and your router name.) c. For Re-enter to confirm: retype the password you entered in step b. d. Click Save Settings e. Click Continue like step [9.g] Fig.13 Administration Tab
Congratulations!
Your wireless network is now secure! Please exit out of your browser by clicking the red X.
The next section explains how to set up your computer to connect to your new network.
COMPUTER
11. Setting Up Wireless Connection a. Click on Start in Windows XP, or click on Windows Icon in Windows Vista. [Fig.14] Fig.14 Windows Start Menu
c. Once the Network Connections window pops up, doubleclick on Wireless Network Connection [Fig.16] Fig.16 Wireless Network Connection
d. Once the Wireless Network Connection Status window pops up, double-click on Properties [Fig.17]
e. Once the Wireless Network Connection Properties window pops up, click on the Wireless Networks tab. [Fig.18]
Vantage Point Computing f. In the Wireless Networks tab, click on the Add button below Preferred networks: [Fig.18]
g. The Wireless network properties window will pop up *Refer to [Fig.20] on page 25 for pictures of the following steps*
1. For Network name (SSID): type in the name of your wireless network. This name will be the same as what you chose for 4.d on page 8. 2. Check the labeled Connect even if this network is not broadcasting. 3. Uncheck the labeled The key is provided for me automatically. 4. For Network Authentication: select WPA-PSK from the drop-down list. 5. For Data encryption: select TKIP from the dropdown list. 6. For Network Key: type your network password. This will be the same password you chose in 9.d on page 12. 7. For Confirm network key: retype what you typed in the above step. 8. Click on OK
Vantage Point Computing h. After the Wireless network properties windows closes, click on OK in the Wireless Network Connection Properties window. [Fig.21] Fig.21 Wireless Network Connection Properties
Congratulations!
Your computer is now setup! You are on your secure connection! Fig.22 - Connected
REFERENCE
TERMS Hardware: The physical parts of your connection: computer, router Software: How your computer talks to your hardware. Operating System: The connection between you and your computer. Microsoft Windows: The most common operating system. Web Browser: How you surf the Internet. (Internet Explorer or Mozilla Firefox) Router: The device you will set up. This connects your computer to the Internet. IP Address: Internet Protocol Address - A unique number given to your computer. Internet Connection Type: Your Internet type. (Comcast, ATT) DHCP: Dynamic Host Configuration Protocol Automatically gives IP addresses. Wi-Fi: Wireless networking. Wi-Fi Protected Setup: Linksys automatic wireless setup. This option will not allow you to change your settings. Wireless Network Modes: The types of connections your router will allow. Disabled: No connection is allowed. Mixed: Wireless-B and Wireless-G devices can connect. This option is the best. It balances connections and protection. B-Only: Wireless-B only. These connections are older and less secure. G-Only: Wireless-G only. These connections are newer and more secure. Vantage Point Computing | Security Manual | 28
Security Modes: The type of protection your router will have. WPA Personal: Wi-Fi Protected Access for personal users. More secure than WEP, but still very secure. WPA Enterprise: Wi-Fi Protected Access for corporate users. Requires very expensive hardware. WPA2 Personal: Wi-Fi Protected Access 2 for personal users. This also requires expensive hardware. WPA2 Enterprise: Wi-Fi Protected Access 2 for corporate users. Requires very expensive hardware RADIUS: A special type of Microsoft security. WEP: Wireless Equivalent Privacy Better than no security, but not by much.
SSID: Service Set Identifier The name of your router. Wireless Channel: The channel your router uses. We chose channel 7 because it is not used by other items. WPA Algorithms: The math used for WPA security AES: Advanced Encryption Standard Best security, but not on all devices. TKIP: Temporal Key Integrity Protocol This is secure and most devices can use it.
WPA Shared Key: The password for your network. Group Renewal Rate: How often your computer gets a new connection.
FIG. 1 INTERNET EXPLORER (IE) ----------------------------------------------------------------------------3 FIG. 2 FIREFOX(FF) -----------------------------------------------------------------------------------------3 FIG. 1A IE USER NAME -------------------------------------------------------------------------------------4 FIG. 1B IE PASSWORD --------------------------------------------------------------------------------------4 FIG. 2A FF USER NAME ------------------------------------------------------------------------------------5 FIG. 2B FF PASSWORD--------------------------------------------------------------------------------------5 FIG. 3 BASIC SETUP PAGE ----------------------------------------------------------------------------------6 FIG. 4 WIRELESS TAB ---------------------------------------------------------------------------------------7 FIG. 5 NEW WIRELESS OPTIONS ---------------------------------------------------------------------------8 FIG. 6 WIRELESS NETWORK MODE ------------------------------------------------------------------------9 FIG. 7 WIRELESS NETWORK NAME ---------------------------------------------------------------------- 10 FIG. 8 WIRELESS CHANNEL ------------------------------------------------------------------------------- 11 FIG. 9 WIRELESS SECURITY ------------------------------------------------------------------------------- 12 FIG. 10 WPA PERSONAL ------------------------------------------------------------------------------ 13 FIG. 11 WPA ALGORITHMS --------------------------------------------------------------------------- 14 FIG. 12 CONTINUE SCREEN------------------------------------------------------------------------------- 15 FIG. 13 ADMINISTRATION TAB --------------------------------------------------------------------------- 16 FIG. 14 WINDOWS START MENU ------------------------------------------------------------------------ 18 FIG. 15 WINDOWS NETWORK CONNECTIONS ---------------------------------------------------------- 19 FIG. 16 WIRELESS NETWORK CONNECTION ------------------------------------------------------------- 20 FIG. 17 WIRELESS NETWORK CONNECTION STATUS ---------------------------------------------------- 21 FIG. 18 WIRELESS NETWORK CONNECTION PROPERTIES ---------------------------------------------- 22 FIG. 19 WIRELESS NETWORKS TAB ---------------------------------------------------------------------- 23 FIG. 20 WIRELESS NETWORK PROPERTIES -------------------------------------------------------------- 25 FIG. 21 WIRELESS NETWORK CONNECTION PROPERTIES 2 -------------------------------------------- 26 FIG. 22 CONNECTED -------------------------------------------------------------------------------------- 27
Vantage Point Computing 202 69th Street Darien, Illinois, 60561 (630)887.8980 http://www.vantagepointcomputing.com [email protected]