Solved

ROUTER & WIRELESS AP SECURITY

Posted on 2013-11-05
2
337 Views
Last Modified: 2013-11-06
I am using a Ubiquiti PicoStation M2. I wish to configure it to be secure. None of the information I have stored is extremely sensitive or valuable, however I want a reasonable level of security. This installation is in the country 1/4 mile from anyone. I do see 4 other wireless networks however. I have six different protocols that are compatible with both the Picostation and my computers. They are:
1. WEP
2. WPA-TKP
3. WPA-AES
4. WPA2
5. WPA2-TKIP
6. WPA2.AES

What are the advantages and disadvantages of each of these if it is not too difficult to explain? In my situation, which one would you recommend for me? I DO want one that is not flaky or unstable. Experts?
0
Comment
Question by:Need-a-Clue
2 Comments
 
LVL 26

Assisted Solution

by:Soulja
Soulja earned 100 total points
ID: 39625363
WPA2 AES or TKIP
0
 
LVL 28

Accepted Solution

by:
jhyiesla earned 400 total points
ID: 39625411
First configure the device with a complex password so it's not easy for someone to get into it.

Second, as the other expert says, use WPA2.  It's the most secure protocol and is pretty much recognized by any reasonably modern wireless device.   AES is probably "more" secure, but a lot of devices don't recognize it so I usually use TKIP. In your devices this usually translates to WPA2 Personal TKIP.

Third, if possible use MAC restrictions. What this means is that you put into your device the MAC addresses of devices that you want to allow access.  While this is not foolproof, it does help keep intruders out.

Fourth, you can hid the broadcast of the SSID, usually.  What this means is that someone driving by can't see your wireless network. Most devices will work OK with this once you have them programmed, but I've found that's not 100 % true.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How much power fluctionation is too much? 4 63
Is MSDN subscription the answer? 4 61
server plus 2 94
Find power supply plug from picture.. 6 66
Usually shares are where we want them for our users and we tend to take them for granted. There are times, however, when those shares may disappear causing difficulty for your users. One of the first things to try is searching for files that shou…
Moving your enterprise fax infrastructure from in-house fax machines and servers to the cloud makes sense — from both an efficiency and productivity standpoint. But does migrating to a cloud fax solution mean you will no longer be able to send or re…
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now