• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

MAC address filter and WPA security

ECUHITMAN

Senior member
I have a Linksys wireless-G router. Under the direction of a friend I have set up a MAC address filter (only allowing listed MAC address to gain access) and a WPA Shared Network Key. I am not all that concerned that someone is going to hack into my system, but I would like to make sure that no one can steal bandwidth. Will these security procedures sufficiently protect my network?

Thanks.
 
This page lists the basic security measures.

Link to: Wireless Security.

You can set your system with the simple ones and leave WPA Off for few days.

If No Body logs On leave it Off and check every few days.

Otherwise switch On WPA.

In order to find out of a ?Rouge? computer logged On you can look at the DHCP server in your Cable/DSL Router, see if there is additional unknown IP number dished out.

:sun:
 
Thanks. Like I said before, I am not all that concerned with someone actually attempting to hack into my network (or my computer) but I do want to make it a little more difficult for people trying to get a wi-fi signal and use my bandwidth.

BTW, with the MAC filtering enabled what does a computer that is not listed see? I mean I am sure they can see the network, are they just not allowed to "log on"?

Thanks again.
 
Wireless Signals are propagating through the air like any other "Radio" signal.

As a result Wireless Networks in your reception area (yours and others) would appear in the list of available sources. However unless they can pass the security they can not connect to the system.

Few Entry Level Wireless Gizmos have a setting that eliminates the unwanted sources from the list; it is an artificial arrangement to make people feel good. These systems must receive the unwanted signal in order to know what to eliminate (catch22). So they receive the signal only they do not show it on the list.

:sun:

 
You can turn off the broadcasting of the SSID, which is the name of the access point. That'll keep your average wireless user from seeing your access point's name in their list. The signal will still be hitting their wireless network card, but unless they've got a program that shows them raw signals floating around in the air, they wont see it.

In order to connect to your wireless AP though, you'll have to manually add the access name and configure any WPA pre-shared key's on all your wireless devices.

And like Jack said, unless they get through your security, they wont be able to log on and thus wont be able to steal your bandwidth. They'd have to hack into your wireless network in order to do that, and since you're putting up measures to hopefully keep them from hacking in you are also keeping them from stealing your bandwidth...make sense?
 
Originally posted by: Boscoh
You can turn off the broadcasting of the SSID, which is the name of the access point. That'll keep your average wireless user from seeing your access point's name in their list. The signal will still be hitting their wireless network card, but unless they've got a program that shows them raw signals floating around in the air, they wont see it.

In order to connect to your wireless AP though, you'll have to manually add the access name and configure any WPA pre-shared key's on all your wireless devices.

And like Jack said, unless they get through your security, they wont be able to log on and thus wont be able to steal your bandwidth. They'd have to hack into your wireless network in order to do that, and since you're putting up measures to hopefully keep them from hacking in you are also keeping them from stealing your bandwidth...make sense?

Save yourself some heartache and turn of SSID like the man said....no better way of blocking remote access WLAN poopers...
 
Back
Top