Practical Manual: Notice on Wireless Networks

Source: Internet
Author: User

With the maturity of network technology, network security has become the focus of all people. So what should we pay attention? Here we will introduce WPA and other technical aspects. The security of wireless networks has become a topic that cannot be ignored. We will discuss in detail the details of WPA, especially for home and small enterprise users. Next we will introduce the wireless setting wizard for Windows XP SP2, the wizard greatly simplifies the security setting process of the wireless LAN by using the USB Flash technology.

WPA for wireless network settings

Before getting started, let's take a look at WPA. WPA can solve security problems that WEP cannot solve. The details are not clear in a few words. Simply put, the problem with WEP comes from the sharing of one key by each device on the network. This key is vulnerable to insecurity. Its scheduling algorithm's weakness allows malicious hackers to easily intercept and destroy the WEP password, and then access the internal resources of the LAN.

WPA solves the above problem by using a new protocol called TKIP temporary Key Integrity Protocol. The key used is combined with the MAC address of each device on the network and a larger initialization vector to ensure that each site uses a different cipher stream to encrypt its data. Subsequently, TKIP uses the RC4 encryption algorithm to encrypt data. However, unlike WEP, TKIP modifies Common keys, making the network more secure and vulnerable to damage.

WPA also includes the integrity check function to ensure that the key has not been attacked, and also enhances the user authentication function provided by WEP, which is equivalent to the function of 802. 1x and EAP (Extended Authentication Protocol) support. In this way, WPA can authenticate wireless users through external Radius dial-in user remote authentication. You can also use the Radius protocol to automatically update and assign keys in large networks.

WPA for wireless network settings

Before supporting the emergence of new IEEE 802.11i security standard hardware, as a matter of privilege, WPA mainly targets enterprise networks with relatively easy to capture and destroy keys. Compared with a home or a small enterprise LAN, the process of stealing an enterprise's network key is relatively easy. hackers only need to collect and create information required for attacks from the network traffic for a few days to complete key theft. Similarly, WPA applies to small networks that do not require external authentication and use simple shared keys. The original intention of the designer is to upgrade the device firmware or related client software by adding WPA to an existing wireless device. However, unfortunately, the development of this technology takes time and the implementation of this technology is also the case. If you want to use WPA, you 'd better first check whether your service provider supports this technology. Most service providers support, but not all. More importantly, some older devices may not be upgraded. Therefore, you should first contact the service provider and verify the relevant matters.

Do not forget that you need to upgrade all devices to support WPA, including access points, wireless routers, client network adapters, wireless bridges, and printer servers, any device with wireless interfaces must be upgraded and cannot be used with WEP. In addition, if you are a Windows XP user, you also need to upgrade the software to add WPA support. You can use Windows automatic upgrade service or directly install SP2. For more information, see article 815,485th in the Microsoft Knowledge Base. Http://support.microsoft.com /? Kbid = 815485)

Network and SP2 in wireless network settings

Undoubtedly, Windows XP SP2 brings great improvements to wireless networks. Next we will discuss the Windows Smart network key technology in its wireless network settings wizard. This technology allows users to save Wireless settings including WEP and WPA keys in an XML file, you can also use this file to customize all wireless devices, including Access Point routers and wireless PCs.

This technology supports the use of USB flash memory, so to set up a wireless device, you only need to insert a USB flash disk containing the set data.

Some may have questions about this, because access points and routers rarely provide USB interfaces. I have seen several USB-enabled devices that use USB interfaces to connect to a broadband modem or printer. However, I believe that it will not take long for the manufacturer to realize the market potential and make up for the small shortcomings of the device functions-not to mention that it is not complicated to add USB interfaces to these devices.

Next, you can use the new wireless network settings Wizard to automatically customize your device. Of course, the premise is that you have installed SP2. Microsoft's official website already provides free SP2 download resources, but the file size is very large, and it takes about one hour to download bandwidth.
 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.