Configuring your Home Network

Download Report

Transcript Configuring your Home Network

Simple ways to secure
Wireless Computers
Jay Ferron,
ADMT, CISM, CISSP, MCSE, MCSBA,
MCT, NSA-IAM, TCI
Questions
How many of you have more than one
computer at home?
How do you connect to the Internet (DSL,
cable, dialup)?
How many already have a home router?
Already have a wireless router?
Agenda
What is a Home network
Connecting things together
Firewalls and Filtering
Setting up a home router
Setting up Print and File Sharing
Questions
Home Network
One or more computers connected:


To the Internet with a router
To each other in order to share Resources:
Internet Connections
Sharing Files
Sharing Printers
What is a Router
Connects one network to another
Sometimes called a “Gateway”
In our case it connects to your cable
modem or DSL Line
Routers keep track of IP addresses and
physical (MAC) addresses of hosts
Managed (As we shall see)
What is a Cable/DSL Modem
Usually provided and controlled by your
ISP
Connects your home to the Internet.
This is the device that gets your public IP
address
Normally has no firewall protection
Make sure you use the right cable
What is a Firewall
A device the filters packets or traffic
Its job is to be a traffic cop
You configure the firewall:


What will allow to pass
What will it block
Hides your home network from the outside
world
Can be either in hardware or software
Firewall Protection
Internet
Firewall
Home
Network
1.
Implement a firewall (checks incoming traffic at the network before it gets to your home
network) Default – Blocks all Incoming connections
2.
Leaving you home network default is allow all outbound connections
3.
Hardware firewalls protect you home network by stop all traffic before it get to your
computers
4.
Personal software firewall on your computer blocks incoming and outgoing (lets you know
what is leaving your computer)
Firewall Routers
The idea is layers of protection
Examples of home combo units include



Dlink
Netgear
Linksys
Software Firewalls
Add additional protection by:




Controlling what leaves your computer
Adding a second level of protection
By being aware of application level attacks
By allow you to schedule
Usage of the internet by time (control access at
night)
By location (block content for young children)
Software Firewalls for Home Use
McAfee Firewall
Symantec’s Norton Personal Firewall
Zone Alarm (Free)
Computer Associates with Firewall (free)
Windows Firewall in XP Service Pack 2 (free)
Wireless
What is wireless
Wireless Networking Standards


802.11 a, b, and g
Recommend a standard “g” model
Wireless Security Standards


Recommend Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)
Wireless
Network
Standards
Standard
802.11
802.11a
Description
● A group of specifications for
WLANs developed by IEEE
● Defines the physical and MAC
portion of the data link layer
● Transmission speeds up to 54
megabits per second (Mbps)
● Works well in densely
populated areas
● 11 Mbps
802.11b
802.11g
802.1x
● Good range but susceptible to
radio signal interference
● Enhancement to and
compatible with 802.11b
● 54 Mbps, but at shorter ranges
than 802.11b
● Authenticates clients before it
lets them on the network
● Requires greater hardware and
infrastructure investment
Lesson: Introduction to Securing
Wireless Networks
What are the benefits of wireless networks?
Common threats to wireless security
Wireless network standards
Guidelines for using security to mitigate
risks to wireless networks
Wireless network architecture
What Are the Benefits of Wireless
Networks?
Business benefits:
● Mobile users moving between offices save time and
effort with a transparent connection to the corporate network
● Users can use e-mail, electronic calendars, and chat
technologies when away from their desks
Operational benefits:
● The cost of provisioning network access to buildings is
substantially lowered
● The network can be easily scaled to respond to different
levels of demand when the organization changes
Common Threats to Wireless
Security
● Eavesdropping
● Spoofing
● Interception and modification of transmitted data
● Freeloading
● Denial of service
● Rogue WLANs
Guidelines for Using Security to Mitigate
Risks to Wireless Networks
Require data encryption for all wireless
communications
Require 802.1x authentication to help prevent
spoofing, freeloading, and accidental threats to
your network
If you allow unauthenticated access to your
wireless network, require a VPN connection to
access the corporate network
Specify the use of software scanning tools to
locate and shut down rogue WLANs on your
corporate network
Wireless Network Architecture
ESS
IBSS
BSS
STA
STA
AP
DS
AP
BSS
STA
STA
Demo:
Wireless Devices
Clearsight Scanner
Demo: How to configure Wireless
Firewall/router
Example:





Basic Settings
Wireless Settings
Backup Settings
Set Account name and password
Blocking and Filtering
Steps to protect your wireless
network
1. Change the default password on your router
2. Enable WEP on router and wireless workstation
3. Use MAC address filtering
4. SSID broadcast of
5. Prohibit Peer-to-peer (Ad Hoc) networking
5. Keep current on hardware bios upgrades
Demo:
Rogue Wireless Devices
AirSnare
Weak Passwords
Your computer password is the
foundation of your computer security
No Password = No Security
Old Passwords & Same Password = Little Security
Change the “administrator” password on your
computer
Questions
WWW.MIR.NET
FOR COPIES OF THIS DECK