SETTING UP A WIRELESS NETWORK?

Discussion in 'Wireless' started by UCHEEKYMONKEY, Sep 30, 2007.

  1. Mr.Cheeks

    Mr.Cheeks 1st ever Gold Member! Gold Member

    5,373
    89
    190
    do you know have a config page where is shows your up and downstream in the router/modem?
     
  2. hbroomhall

    hbroomhall Petabyte Poster Gold Member

    6,624
    117
    224
    This router does. According to the docs I've downloaded it is on the first page you connect to.

    Harry.
     
    Certifications: ECDL A+ Network+ i-Net+
    WIP: Server+
  3. UCHEEKYMONKEY
    Honorary Member

    UCHEEKYMONKEY R.I.P - gone but never forgotten. Gold Member

    4,140
    58
    214
    Yep Just found it!

    Cheeks did you take your N+ ?

    Downstream
    Data Rate(Kbps) 2432
    Noise Margin (db) 12.8
    Output power (dbm) 19.1
    Attenuation (db) 47.0

    Upstream

    Data Rate(Kbps) 640
    Noise Margin (db) 17.0
    Output power (dbm) 12.5
    Attenuation (db) 26.5
     
    Certifications: Comptia A+
    WIP: Comptia N+
  4. Mr.Cheeks

    Mr.Cheeks 1st ever Gold Member! Gold Member

    5,373
    89
    190
  5. UCHEEKYMONKEY
    Honorary Member

    UCHEEKYMONKEY R.I.P - gone but never forgotten. Gold Member

    4,140
    58
    214
    Certifications: Comptia A+
    WIP: Comptia N+
  6. Mr.Cheeks

    Mr.Cheeks 1st ever Gold Member! Gold Member

    5,373
    89
    190
    no probs - oh im not studying for N+, never had done... you have good upload speed, afaik upload on 2mb downstream is 256k normally...
     
  7. stuPeas

    stuPeas Megabyte Poster

    774
    12
    76
    Sorry I didnt answer last night UCM but my back went into spasm so I had to be connected to my little "TENS" machine.

    Glad to hear you got it sorted and hopefully you now have some idea of what to do if something goes wrong (try turning it off and on again). :D
     
    Certifications: C&G Electronic, CIW Associate (v5).
    WIP: CIW (Website Design Manager)
  8. UCHEEKYMONKEY
    Honorary Member

    UCHEEKYMONKEY R.I.P - gone but never forgotten. Gold Member

    4,140
    58
    214
    Thanks Stu!:biggrin

    Hope you get well soon!8)
     
    Certifications: Comptia A+
    WIP: Comptia N+
  9. UCHEEKYMONKEY
    Honorary Member

    UCHEEKYMONKEY R.I.P - gone but never forgotten. Gold Member

    4,140
    58
    214
    Q) Is it possible to disguise or turn off the ssid on a wirless network??

    When I use my laptop I can see my mates wireless router and others around the neighbourhood.

    Now if people can see them what's to stop them trying to hack the network? There must be away of switching it off. Not sure if I am explaining myself but away to stop the broadcast signal??8)
     
    Certifications: Comptia A+
    WIP: Comptia N+
  10. Boycie
    Honorary Member

    Boycie Senior Beer Tester

    6,281
    85
    174
    UCM,

    Yes, most units allow you to broadcast/hide the SSID.
    I have found wireless connections to be more stable with it broadcasting.

    Simon
     
    Certifications: MCSA 2003, MCDST, A+, N+, CTT+, MCT
  11. hbroomhall

    hbroomhall Petabyte Poster Gold Member

    6,624
    117
    224
    Yes - it is possible to stop the SSID appearing. However it is trivial for a hacker to discover it, so, IMHO, it is a waste of time doing this.

    In addition, some versions of Windows have a problem re-aquiring such a connection.

    Harry.
     
    Certifications: ECDL A+ Network+ i-Net+
    WIP: Server+
  12. stuPeas

    stuPeas Megabyte Poster

    774
    12
    76
    If someone wants to hack you, then the ssid is the least of their problems. WPA will provide good protection but will NEVER stop a determined hacker/cracker. The thing is, cracking the WPA will present them with a lot of work and there must be something REALLY special on your network for them to bother. So you will more than likely be pretty safe mate. :D
     
    Certifications: C&G Electronic, CIW Associate (v5).
    WIP: CIW (Website Design Manager)
  13. UCHEEKYMONKEY
    Honorary Member

    UCHEEKYMONKEY R.I.P - gone but never forgotten. Gold Member

    4,140
    58
    214
    Thanks Boyce, Harry and Stu:biggrin

    The guy at work said if i really wanted a secure network I could use something called MAC filtering?

    Q) Has anyone heard of this or had experience in it??

    Q) on a wirless modem Router, do you have to keep the device on all the time even when your not using the net?
    I tried to connect to the net earlier and found I could not connect through the PC and Laptop wireless. However I could connect to the web interface on the modem-router and notice it stated it was connected. But couldn't load a page from the internet??

    The only way around this was to switch off and on the router!??

    Q) should switch on the PC's on the network first before switching on the router modem or should it not matter?:blink
     
    Certifications: Comptia A+
    WIP: Comptia N+
  14. hbroomhall

    hbroomhall Petabyte Poster Gold Member

    6,624
    117
    224
    This is another 'security' enhancement that doesn't quite deliver.
    Most APs have such a feature, but it is fairly easy to listen to the network and spoof the MAC. So don't rely on it.
    This shouldn't happen. You'll need to investigate why. Best to look in the router logs (if it has any) to see what happened.
    How long did you wait for the page to load? If the session had dropped then it needs to go through the motions of getting it back up again, which can take a little time if your ISP has an overloaded RADIUS server.
    I'd always switch the router on first. But normaly I leave it on permanently.


    Harry.
     
    Certifications: ECDL A+ Network+ i-Net+
    WIP: Server+
  15. Sparky
    Highly Decorated Member Award 500 Likes Award

    Sparky Zettabyte Poster Moderator

    10,718
    543
    364
    MAC filtering isnt secure.

    I keep my router on but sometimes the internet connection drops and I have to reboot it.

    If the connections drops frequently then perhaps look for a firmware upgrade for the router.
     
    Certifications: MSc MCSE MCSA:M MCSA:S MCITP:EA MCTS(x5) MS-900 AZ-900 Security+ Network+ A+
    WIP: Microsoft Certs
  16. UCHEEKYMONKEY
    Honorary Member

    UCHEEKYMONKEY R.I.P - gone but never forgotten. Gold Member

    4,140
    58
    214
    Thanks sparky:thumbleft
     
    Certifications: Comptia A+
    WIP: Comptia N+
  17. UCHEEKYMONKEY
    Honorary Member

    UCHEEKYMONKEY R.I.P - gone but never forgotten. Gold Member

    4,140
    58
    214
    Here's the security Log there seems to be a lot of attempts toeither ping the router or attack it. I don't reconize those IP address?

    System log:
    Jan 1 00:00:36 (none) daemon.crit pppd[470]: Received valid IP address from server. Connection UP. 107
    Oct 2 08:50:02 (none) daemon.crit pppd[1721]: Received valid IP address from server. Connection UP. 108
    Oct 2 18:12:25 (none) daemon.crit pppd[6428]: Received valid IP address from server. Connection UP. 108
    Firewall log:
    Oct 2 08:50:38 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.142.237 117

    Oct 2 08:50:38 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.142.237 115

    Oct 2 08:52:04 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.12.189 116

    Oct 2 08:52:04 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.12.189 114

    Oct 2 08:52:07 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.12.189 116

    Oct 2 08:52:07 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.12.189 114

    Oct 2 18:16:08 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.122.43 116

    Oct 2 18:16:08 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.122.43 114

    Oct 2 18:16:11 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.122.43 116

    Oct 2 18:16:11 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.122.43 114

    Oct 2 18:16:41 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 221.126.249.71 117

    Oct 2 18:16:41 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 221.126.249.71 115

    Oct 2 18:17:09 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 193.138.206.46 117

    Oct 2 18:17:09 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 193.138.206.46 115

    Oct 2 18:21:07 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.5.83 114

    Oct 2 18:21:07 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.5.83 112

    Oct 2 18:21:10 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.5.83 114

    Oct 2 18:21:10 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.5.83 112

    Oct 2 18:24:16 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 62.147.7.237 115

    Oct 2 18:24:16 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 62.147.7.237 113

    Oct 2 18:24:20 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 62.147.7.237 115

    Oct 2 18:24:20 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 62.147.7.237 113

    Oct 2 18:25:04 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.5.83 114

    Oct 2 18:25:04 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.5.83 112

    Oct 2 18:33:54 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.122.43 116

    Oct 2 18:33:54 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.122.43 114

    Oct 2 18:33:57 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.122.43 116

    Oct 2 18:33:57 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.122.43 114

    Oct 2 18:43:47 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 61.145.228.91 116

    Oct 2 18:43:47 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 61.145.228.91 114

    Oct 2 18:46:17 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.149.174.163 117

    Oct 2 18:46:17 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.149.174.163 115

    Oct 2 18:46:41 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 78.107.27.243 116

    Oct 2 18:46:41 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 78.107.27.243 114

    Oct 2 18:51:22 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.9.174 115

    Oct 2 18:51:22 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.9.174 113

    Oct 2 18:58:00 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.157.220.56 116

    Oct 2 18:58:00 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.157.220.56 114

    Oct 2 18:58:03 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.157.220.56 116

    Oct 2 18:58:03 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.157.220.56 114

    Oct 2 18:58:09 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.157.220.56 116

    Oct 2 18:58:09 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.157.220.56 114

    Oct 2 19:02:27 (none) user.alert kernel: ICMPFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 77.64.132.170 115

    Oct 2 19:02:27 (none) user.alert kernel: PINGIN=ppp_0_38_1 OUT= MAC= attack detected from 77.64.132.170 110

    Oct 2 19:02:29 (none) user.alert kernel: ICMPFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 77.64.132.170 115

    Oct 2 19:02:29 (none) user.alert kernel: PINGIN=ppp_0_38_1 OUT= MAC= attack detected from 77.64.132.170 110

    Oct 2 19:10:50 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.38.32 115

    Oct 2 19:10:50 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.38.32 113

    Oct 2 19:10:53 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.38.32 115

    Oct 2 19:10:53 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.38.32 113

    Oct 2 19:19:30 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 200.170.227.101 118

    Oct 2 19:19:30 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 200.170.227.101 116

    Oct 2 19:19:33 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 200.170.227.101 118

    Oct 2 19:19:33 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 200.170.227.101 116

    Oct 2 19:23:21 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.14.188 116

    Oct 2 19:23:21 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.14.188 114

    Oct 2 19:23:23 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.14.188 116

    Oct 2 19:23:23 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 82.153.14.188 114

    Oct 2 19:25:09 (none) user.alert kernel: LANDATTACKIN=ppp_0_38_1 OUT= MAC= attack detected from 68.151.196.203 117

    Oct 2 19:25:09 (none) user.alert kernel: SYNFLOODIN=ppp_0_38_1 OUT= MAC= attack detected from 68.151.196.203 115

    8)
     
    Certifications: Comptia A+
    WIP: Comptia N+
  18. hbroomhall

    hbroomhall Petabyte Poster Gold Member

    6,624
    117
    224
    Welcome to the Internet!

    Do you want the many MB of logs of automated attempts to break into my LAN? :biggrin

    This is why firewalls and similar items exist.

    Harry.
     
    Certifications: ECDL A+ Network+ i-Net+
    WIP: Server+
  19. stuPeas

    stuPeas Megabyte Poster

    774
    12
    76
    Don't worry to much about this UCM. Just imagine all the attacks a PC is subjected to WITHOUT a firewall. I saw an experiment on TV once where an unprotected windows machine was placed on the net without protection. In under a minute it was bombarded with attacks and within 30 minutes the machine was TOTALLY unusable.
     
    Certifications: C&G Electronic, CIW Associate (v5).
    WIP: CIW (Website Design Manager)
  20. Boycie
    Honorary Member

    Boycie Senior Beer Tester

    6,281
    85
    174
    Stu,

    Was this the honeypot the BBC setup?

    Simon
     
    Certifications: MCSA 2003, MCDST, A+, N+, CTT+, MCT

Share This Page

Loading...
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.