Wireless networking with Cisco 340 stuff

Associate
Joined
20 Feb 2006
Posts
1,200
Location
London
Right, have Cisco 340 access point and wifi card for my computer. I'm a complete newb when it comes to networking, so I have a number of questions.

The parts were bought off ebay, from reputable sellers, so they should hopefully work. However, I lack all the drivers and software. Can someone provide links to where I can download these, as I took at look at the cisco site, and it was very confusing.

Also, securing the network. Any recommendations for how to go about doing this? there will be one desktop with a wifi card and one of the G4 ibooks in the wireless network. The desktop will be the administrator, whereas the G4 laptop just needs internet access. there is one other PC, but that will be wired up.

The "network" is more for internet access rather than anything else, but I want to get this right.

Cheers for any help.
 
update time.

The wireless card in my pc works perfectly. Connected up to next door's unsecured network fine. Back to wired at the moment, however.

And now for my problem. My Aironet 340 access point seems unable to detect or to transmit the network. I just get the middle light of the three (the one by the boxed S), flashing green. Any ideas? I didn't have any documentation, and I can't find any.

cheers for any help.
 
Hi,

I've got the driver CD for the CISCO 340AP if you need it.
(email me)

Security wise, they are hackable (...no WPA)
one of the options is to run a VPN accross the AP's.
 
bitslice said:
Security wise, they are hackable (...no WPA)

WEP isnt exactly what id call weak security if implemented correctly, no they arnt "Hackable" as you say..

Get the facts right.

As for the first question i assume this would be what your after, have you got the exact model your using?

http://www.cisco.com/en/US/products...figuration_guide_chapter09186a0080234dd3.html

To add if you new to this youve picked one of the more tricky AP's which are out there to configure.
 
Curiosityx said:
WEP isnt exactly what id call weak security if implemented correctly, no they arnt "Hackable" as you say..

Get the facts right.


I think you are wrong


how to crack WEP:

http://www.tomsnetworking.com/2005/05/10/how_to_crack_wep_/

http://wepcrack.sourceforge.net/

http://hardware.slashdot.org/article.pl?sid=05/04/05/1428250


WEP + Radius = OK,
but WEP is flawed.

Actually I'd quite like to know other other ways around this, so I wouldn't say no to a followup post :-)






.
 
Last edited:
bitslice said:
I think you are wrong


how to crack WEP:

http://www.tomsnetworking.com/2005/05/10/how_to_crack_wep_/

http://wepcrack.sourceforge.net/

http://hardware.slashdot.org/article.pl?sid=05/04/05/1428250


WEP + Radius = OK,
but WEP is flawed.

Actually I'd quite like to know other other ways around this, so I wouldn't say no to a followup post :-)

.

Yes im well aware of how to crack it and have done so as a example to several people i know.

The fact being though in a home user environment you would have to camp outside someones house within distance of the AP for at least a month if not longer to gather enough data or "Weak" keys in order to calculate the wep key used. This is of course if the user doesnt change the key during the attack.

Cracking Wep only becomes viable when your looking at a network with constant heavy traffic which will allow you to gather more data in a shorter space of time. As such in an enterprise environment i wouldnt recommend it, for home users its perfectly safe unless you utilize the connection 10 hours a day.
 
Curiosityx said:
Yes im well aware of how to crack it
yep, thought you would be, that's why I'd hoped you'd followup.

Curiosityx said:
camp outside someones house within distance of the AP for at least a month if not longer to gather enough data or "Weak" keys in order to calculate the wep key used

not true

...void11 attack, force deauthentication, create lots of packets.
...or replay attack, same result

see 3rd link, FEDs did it in three minutes


Curiosityx said:
This is of course if the user doesnt change the key during the attack.

umm, not even I spend that much time looking at syslog events.
Granted it is obvious if user is actually online at the time.

Curiosityx said:
WEP isnt exactly what id call weak security if implemented correctly

you didn't actually answer this one, you just said it was difficult.


AFAIK this still leaves WEP (as a protocol) as flawed no matter how it is implemented, which is the only bit I took issue with


.
 
Back
Top Bottom