RickRansom wrote:Other than setting your wireless security to WPA2 only[double that with pure AES encryption], you can also add in wireless mac filtering and a limited number of IP addresses in your pool, [almost]all of which have been assigned to your devices via DHCP reservation. I have a Cisco EA2700 and if I have people coming over, they can always connect to my guest network so no security risk there. The guest network runs on a different pool [192.168.1.x vs 192.168.33.x]. And no, you won't be able to go online unless you have the password for the guest network.
JimDandySTX wrote:FYI MAC filtering really down't add much to your security as many WiFi scanning programs (inSSider, etc. ) tell you the MAC address of connected devices meaning that all an intruder has to do is clone a connected MAC address and then they can try and hack into your network. Best most people can do is a stong WPA2 AES PSK.
MAC Address – This is a unique identifier for a wireless network. In an infrastructure
network, this will be the radio’s MAC Address. In an Ad-Hoc environment, this will be a
pseudo-randomly generated MAC Address.
RickRansom wrote:JimDandySTX wrote:FYI MAC filtering really down't add much to your security as many WiFi scanning programs (inSSider, etc. ) tell you the MAC address of connected devices meaning that all an intruder has to do is clone a connected MAC address and then they can try and hack into your network. Best most people can do is a stong
If inSSider[or any other tool] can check the MAC address of my devices even if they're not connected to my[main] network, that would be something new to me. They'd have to get into my home and hardwire a PC to my router before they can even try to screw me up.
JimDandySTX wrote:For those of you that have an academic interest on how to hack a wireless network I suggest that you read the article linked below on Small Network Builders. In the first page of this article the author basically states that MAC address filitering is almost worthless as a security measure and shows you an example of why.
http://www.smallnetbuilder.com/wireless ... -wpa2-2012
Time Required to Exhaustively Search this Password's Space:
Online Attack Scenario: 14.14 million trillion centuries
(Assuming one thousand guesses per second)
Offline Fast Attack Scenario: 1.41 hundred billion centuries
(Assuming one hundred billion guesses per second)
Massive Cracking Array Scenario: 1.41 hundred million centuries
(Assuming one hundred trillion guesses per second)
renojim wrote:There's nothing wrong with WPA. While WEP can be hacked within minutes, to say that's possible with WPA is simply wrong unless you're using something like password as your password. The only attack I'm aware of for WPA is a dictionary attack. And in case you're wondering, I've proven to myself how easy it is to hack into a WEP protected network and how nearly impossible it is to hack into a WPA protected network. Unless something's changed since the last time I researched it, I feel perfectly safe with my WPA protected network.
W_S wrote:The Answer to connecting Roku to Actiontec c1000a is to change it's channel to channel 11, same thing applies to any other Wireless modem. I had to do the same thing with CableOne's Motorola wireless modem absolutely has to be on channel 11 for Roku to connect. My friend across town could not connect to Roku I changed his channel to 11 and 1st try it connected. IT HAS TO BE ON CHANNEL 11 !!!!
W_S wrote:After not being able to connect to Roku, I went to Roku's tech support they told me to set router to channel 11, it was not due to overcrowed channels. This is not mentioned in Roku's setup instructions that come with the unit.
Users browsing this forum: mchasal and 21 guests