Wireless Router Setup
description
Transcript of Wireless Router Setup
![Page 1: Wireless Router Setup](https://reader031.fdocuments.net/reader031/viewer/2022012913/56813c2f550346895da5ab71/html5/thumbnails/1.jpg)
Wireless Router Setup
![Page 2: Wireless Router Setup](https://reader031.fdocuments.net/reader031/viewer/2022012913/56813c2f550346895da5ab71/html5/thumbnails/2.jpg)
Internet Cable
Internet Cable (Blue) Machine Cable (Yellow)
Power Plug (Black) Reset Button (Red)
![Page 3: Wireless Router Setup](https://reader031.fdocuments.net/reader031/viewer/2022012913/56813c2f550346895da5ab71/html5/thumbnails/3.jpg)
Web Login 192.168.1.1
Manufacture Defaultaccount: adminpassword:admin
![Page 4: Wireless Router Setup](https://reader031.fdocuments.net/reader031/viewer/2022012913/56813c2f550346895da5ab71/html5/thumbnails/4.jpg)
DHCP
![Page 5: Wireless Router Setup](https://reader031.fdocuments.net/reader031/viewer/2022012913/56813c2f550346895da5ab71/html5/thumbnails/5.jpg)
Change administration password
![Page 6: Wireless Router Setup](https://reader031.fdocuments.net/reader031/viewer/2022012913/56813c2f550346895da5ab71/html5/thumbnails/6.jpg)
Change the wireless network name
Manufacturer Default: Linsys
![Page 7: Wireless Router Setup](https://reader031.fdocuments.net/reader031/viewer/2022012913/56813c2f550346895da5ab71/html5/thumbnails/7.jpg)
Secure: Limit Access By Mac Address
![Page 8: Wireless Router Setup](https://reader031.fdocuments.net/reader031/viewer/2022012913/56813c2f550346895da5ab71/html5/thumbnails/8.jpg)
Secure: Limit by setting up password
![Page 9: Wireless Router Setup](https://reader031.fdocuments.net/reader031/viewer/2022012913/56813c2f550346895da5ab71/html5/thumbnails/9.jpg)
Encryption Scheme
WEPWired Equivalent Privacy (WEP) is a deprecated security algorithm for IEEE 802.11 wireless networks WPAWi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. TKIP is a 128-bit per-packet key, meaning that it dynamically generates a new key for each packet and thus prevents collisions.The later WPA2 certification mark indicates compliance with the full IEEE 802.11i standard. This advanced protocol will not work with some older network cards. WPA2
![Page 10: Wireless Router Setup](https://reader031.fdocuments.net/reader031/viewer/2022012913/56813c2f550346895da5ab71/html5/thumbnails/10.jpg)
Wireless Hacking storiesWEP Since 2001, several serious weaknesses in the protocol have been identified by cryptanalysts with the result that today a WEP connection can be cracked with readily available software within minutes.WPAIn October 2009, Halvorsen with others made further progress, enabling attackers to inject larger malicious packets (596 bytes, to be more specific) within approximately 18 minutes and 25 seconds.Althought the vulnerabilities in WPA-TKIP, WPA-TKIP is still a configuration option upon a wide variety of wireless routing devices provided by many hardware vendors. Reference: http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access
![Page 11: Wireless Router Setup](https://reader031.fdocuments.net/reader031/viewer/2022012913/56813c2f550346895da5ab71/html5/thumbnails/11.jpg)
Diagnose the network
![Page 12: Wireless Router Setup](https://reader031.fdocuments.net/reader031/viewer/2022012913/56813c2f550346895da5ab71/html5/thumbnails/12.jpg)