Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
programming4us
Windows 7

Configuring and Troubleshooting Wireless Connectivity (part 1) - Using Wireless Security & Configuring Wireless on Windows 7

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
6/14/2011 3:44:19 PM
One of the great strengths of mobile computers is their ability to connect to wireless networks. Today, most mobile computers come with built-in wireless capabilities, and you can connect to wireless networks within the company and in public places.

Windows 7 supports all the standard wireless protocols. If your wireless devices and wireless NICs support it, so does Windows 7. This includes 802.11a, 802.11b, 802.11g, and 802.11n. Windows 7 also supports the newer WPA2 authentication options that significantly improve wireless network security. In this section, you'll learn about

  • Using wireless security

  • Configuring wireless on Windows 7

  • Connecting to a wireless network

  • Troubleshooting wireless connections

1. Using Wireless Security

When wireless networks were first designed, the primary goal was ease of use. The designers wanted to make it easy to discover, connect to, and use wireless networks. They did a great job. However, security was more of an afterthought.

They came up with Wired Equivalent Privacy (WEP) to provide the same level of privacy for a wireless network as you'd have in a wired network. Unfortunately, WEP had significant problems and was later cracked. Attackers could download software from the Internet and easily crack WEP-protected networks.

Wi-Fi Protected Access (WPA) is the first improvement over WEP. One of the primary benefits of WPA is that it is compatible with most of the same hardware that used WEP. WPA was intended to be an interim fix for WEP until a more permanent solution was identified. Although WPA is more secure than WEP, attackers have cracked it.

Wi-Fi Protected Access 2 (WPA2) is the permanent fix for WEP. It is also known as 802.11i. If you have a choice among WEP, WPA, and WPA2, use WPA2. WPA2 provides the strongest security.

WEP is not recommended for use today. You should use at least WPA, but use WPA2 whenever possible. WEP is easy to crack. Even though WPA has vulnerabilities, it isn't as vulnerable as WEP.


When configuring Windows 7 to connect to a wireless network, you should have an understanding of the security types and encryption types available. First, it's important to understand what each of these is doing:


Security type

The security type identifies the type of authentication used. Authentication is used to verify a client prior to allowing access.


Encryption type

After the client connects, the data can be encrypted. This provides confidentiality by preventing others from being able to read the data. Advanced Encryption Standard (AES) is a strong, efficient encryption algorithm. WEP can also be selected as an encryption type for some security types. However, WEP is the weakest.

Consider Figure 1. It shows the security settings for a wireless profile named WileyNetwork. As you can see, it is using the WPA2-Enterprise security type and AES as the encryption type. These are the strongest settings available.

Figure 1. Wireless profile security settings

This figure also shows the Choose A Network Authentication Method drop-down box. These selections are available only for the WPA-Enterprise and WPA2-Enterprise security types. The Microsoft: Smart Card Or Other Certificate option (selected in the figure) is the strongest authentication method available. You can also choose the Microsoft: Protected EAP (PEAP) authentication method.

It's important to realize that you must match these settings to the wireless network. In other words, if your network is using a wireless access point with WPA2-Personal, you must configure Windows 7 to use WPA2-Personal. Otherwise, the Windows 7 system won't connect.

Windows 7 supports the following security types:

No Authentication (Open)

This uses no authentication. It is not recommended for use in a production environment but can be used for testing.

You can select either WEP or None for encryption. If you select WEP, you also need to enter a pre-shared key (PSK). This is also known as a password or passphrase. You need to enter the same PSK on the Windows 7 system as is used on the wireless device.

Shared

Shared uses a PSK for authentication and WEP for encryption. WEP uses the same PSK that you enter for authentication. Shared is not recommended for use in a production environment but can be used for testing. It is marginally better than No Authentication (Open) but can be easily cracked.

WPA-Personal

WPA-Personal uses a pre-shared key for authentication. This PSK provides limited authentication.

You can select either Advanced Encryption Standard (AES) or Temporal Key Integrity Protocol (TKIP) for encryption. TKIP is compatible with older hardware, but AES is preferred if your hardware supports it.

WPA-Enterprise

WPA-Enterprise is similar to WPA except that it uses an 802.1x server for authentication. The 802.1x server will distribute the keys to each client instead of the clients using a PSK. It can also use either smart cards or Protected Extensible Authorization Protocol (PEAP) for authentication. Smart cards provide better security, but they also require more resources on your network. For example, you must have a Public Key Infrastructure (PKI) to issue certificates for the smart cards.

You can select either AES or TKIP for encryption. AES is preferred.

WPA2-Personal

WPA2-Personal is similar to WPA-Personal except it uses the stronger WPA2 authentication instead of WPA. WPA2-Personal uses a PSK. You enter the same PSK on the Windows 7 system and the wireless devices.

You can select either AES or TKIP for encryption. AES is preferred.

WPA2-Enterprise

WPA2-Enterprise is the strongest security type available with Windows 7. It uses an 802.1x server for authentication just as WPA-Enterprise does. It can use either smart cards or PEAP for authentication. Smart cards provide the best authentication.

You can select either AES or TKIP for encryption. AES is preferred.

802.1x

The 802.1x security type was intended to provide better protection for WEP by providing a better authentication mechanism when WEP was used. With WEP no longer recommended, this is also not recommended.

802.1x uses WEP for encryption.

There's an important distinction when using 802.1x servers. The 802.1x security type is not recommended because it uses WEP, and WEP is not secure. However, WPA-Enterprise and WPA2-Enterprise both use 802.1x servers. WPA2-Enterprise provides the best security, and it is recommended for use in enterprise environments.


Both WPA and WPA2 can use either Personal or Enterprise mode. When Personal is used (as in WPA-Personal or WPA2-Personal), it uses a pre-shared key (PSK). This PSK can be a password or passphrase. When Enterprise is used (as in WPA-Enterprise or WPA2-Enterprise), an 802.1x server is used.

2. Configuring Wireless on Windows 7

You can configure a Windows 7 computer to work with three different wireless configurations. You can connect to wireless access point or a wireless router in a network. You can also configure a Windows 7 system to connect to an ad hoc network.

2.1. Wireless Access Point

A wireless access point (WAP) can be used to provide access from a wireless device to a wired network. WAPs are commonly used in larger networks to provide this access.

Figure 2 shows how a Windows 7 system can connect to a WAP in a network. Once the Windows 7 system is connected, it can access resources in the network just as if it were a wired computer.

Figure 2. Wireless access point in a network

The wireless client will be able to connect to servers in the network. If other clients have Internet access, the wireless client will also have Internet access.

2.2. Wireless Routers

A wireless router is a WAP with additional capabilities. Many small offices, home offices (SOHOs) and home users commonly use a wireless router. Figure 3 shows how a wireless router can be used to provide connectivity for users in a network.

Figure 3. Wireless router in a network

The wireless client is able to connect to the wireless router and have access to the same resources as the wired user. Notice how the router has connectivity with the Internet. On the Internet side, it would have a public IP address issued from the Internet service provider. On the internal network side, it would have a private IP address. In addition to being a router, it would also have network address translation (NAT) capabilities to translate the internal private IP addresses to external public IP addresses.

Most wireless routers also have DHCP capabilities. DHCP is used to issue TCP/IP configuration to internal clients. This includes IP addresses, subnet masks, default gateway addresses, DNS addresses, and more.

2.3. Ad Hoc Network

Ad hoc is a Latin phrase that essentially means "as needed." An ad hoc network is a wireless network without a wireless access point or wireless router. Imagine that you and a friend or two want to connect your computers to share some data or even play a game. If all three of your computers have wireless capabilities, you can create an ad hoc network.

Figure 4 shows three wireless users configured in an ad hoc wireless network. One of the computers creates the ad hoc network, and the other two computers connect to it.

An ad hoc network is created for a specific purpose but is usually destroyed when users disconnect. However, it is possible to save the network profile for later use.

Figure 5 shows the screen used to create the ad hoc network. You need to give the network a name. In the figure, I've called it TempAdHoc. You also need to identify the security type and the security key that will be used. The security key is a pre-shared key such as a password or passphrase. All participants in the ad hoc network need to use the same security type and PSK.

Figure 4. A wireless ad hoc network

Figure 5. Creating a wireless ad hoc network

You can get to the screen shown in Figure 5 by clicking Control Panel => Network And Internet => Network And Sharing Center. You can also get to the Network and Sharing Center by entering Network in the Control Panel Search box and selecting Network And Sharing Center. From there, click Manage Wireless Networks. Click Add and select Create An Ad Hoc Network.

The Manage Wireless Networks screen will appear only on clients that have wireless NICs. If your system doesn't have a wireless NIC installed, you will not see this choice.


Ad hoc networks support three security types:

No Authentication (Open)

Data is sent in the clear. Generally, this is not recommended. However, gamers may choose this for better performance over a wireless network.

WEP

If older computers support only WEP, you can use this. It has known vulnerabilities but is better than nothing to secure the connection.

WPA2-Personal

WPA2-Personal provides the best security. An ad hoc network does not support WPA2-Enterprise.

NOTE

WPA-Personal is not available as a choice for ad hoc networks. WPA Enterprise and WPA2 Enterprise aren't available as choices either, because you are connected only between peers. Enterprise choices require a separate 802.1x server to be used for authentication.

The security key is a shared secret. Each user will need to enter the same security key in their wireless profile to connect to the ad hoc network.

Last, if you want to save the ad hoc network for later use, you can check the Save This Network box, as shown in Figure 5 earlier. It will save this as an ad hoc profile that can be used later.

Only the first computer needs to create the ad hoc network. Once it's created, other computers can connect to it as if it was a wireless network connection.

Other -----------------
- Microsoft Visio 2010 : Identifying 1-D Shapes and Types of Glue & Positioning Shapes with Rulers and Guides
- Visual Basic 2010 : Serialization in the ADO.NET Entity Framework
- Visual Basic 2010 : Serialization in Windows Communication Foundation
- Microsoft Excel 2010 : Creating and Modifying Charts - Selecting Chart Elements & Formatting Chart Elements
- Microsoft Excel 2010 : Creating and Modifying Charts - Changing a Chart Type & Changing a Chart Layout and Style
- Microsoft Visio 2010 : Serialization with XAML
- Microsoft Visio 2010 : Custom Serialization
- Microsoft Visio 2010 : Connecting Shapes with Dynamic Connectors
- Microsoft Visio 2010 : Copying and Pasting Shapes & Connecting Shapes with Lines
- Microsoft PowerPoint 2010 : Working Together on Office Documents - Creating Office Documents on Windows Live
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server