Connecting To Wireless Lan Using Win Xp

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Connecting To Wireless Lan Using Win Xp as PDF for free.

More details

  • Words: 3,638
  • Pages: 17
Connecting to Wireless LAN using Win XP Now we can start to configure your Windows XP.

I. To configure your builtin wireless LAN card: 1. On Start Menu , click Connect To and then Show all connections 2. Then you will see the screen as shown on left. Right click Wireless Network Connection and select Properties

II. Click Wireless Networks tab and then click Advanced, deselect Automatically connect to non-preferred networks and click Close.

and then click Add... in Preferred networks.

III. Fill in the name alumninet in the field Network name (SSID) and select Disabled in Data Encryption

Click OK. If the network can be found, the status of the builtin wireless LAN card show Connected and you can try to configure VPN. If you notice that you are connected to network other than alumninet, please disable Wireless Network Connection and enable again.

IV. Make a VPN New Connection using Internet Protocol Security (IPSec) 1. On Start Menu , click Connect To and then Show all connections 2. Then you will see the screen as shown on left. Click Create a new connection on the left.

V. After the Internet Connection Wizard started up, click next. Then choose the option Connect to the network at my workplace in the screen as shown below. Then press Next

<>

VI. Choose Virtual Private Network connection. Click the Next button.

VI. Enter a name for this connection: Alumni Wireless VPN

VII. If your computer has set up another connection, then this step as shown below may appear. (Only part of the users face this step.) Choose Do not dial the initial connection. Click the Nextbutton.

VIII. Input the name vpn-wlan.alumni.cuhk.edu.hk to the field of Host Name or IP address. Click the Next button.

IX. Check the option at the bottom of the dialog to add a short-cut on desktop. Click the Finish button.

Connect VPN dialog box will appear. Click Properties and edit according to the followings steps.

X. Edit a VPN Connection using Internet Protocol Security (IPSec). In the Security tab of the Properties dialog box for the VPN connection, choose Advanced (custom settings) and click Settings.

XI. For Data encryption, choose Require encryption(disconnect if server declines). And choose Allow these protocols for Logon security. Check Unencrypted password (PAP), Microsoft CHAP (MS-CHAP) and Microsoft CHAP Version 2 (MS-CHAP v2). Then click OK button to finish the setting.

XII. Click IPSecSettings button. Choose Use pre-shared key for authentication and enter ipsec-vpn. Then click OK to finish.

XIII. Click Networking tab. Under the Type of VPN, choose L2TP IPSec VPN. Then press OK to finish it.

XIV. Now you can connect the Alumni Wireless LAN by double click the VPN icon in the Network Connections Folder. Input your Alumni Internet e-mail address and password in the dialog box. Click OK to connect.

If your computer connects to the network successfully, a message showing VPN is now connected will be prompted in the system tray of the bottom-right-hand corner. Click the cross to close it.

Do it Once you have a business plan in place that defines how you want to add wireless networking capabilities to your office, you can begin setting up your wireless network. It's easier than you might think. Tip: Wireless networks require some sort of wired connection to the internet. Before you put your wireless network in place, be sure you have a T-1, DSL (digital subscriber line) cable or broadband connection in place in your office.

Step 1: Equip yourself A wireless LAN essentially consists of two main components: wireless-enabled devices (integrated or add-in cards for desktop and notebook PCs and handheld devices) and wireless access points (or routers). Before you can set up your wireless network, you should acquire at least one wireless access point. Note: Most wireless access points can pick up signals within 150 feet or more, although many factors, such as dense walls and furniture, can reduce the actual range. You might need two or more access points if your office space is very large. Then, be sure that every user who will connect to the network has a wireless-enabled device. In addition, you must also take proper security precautions against open access and unauthorized usage (as discussed in the Use it section).

Step 2: Configure your wireless LAN Install the access point. Connect the access point to your wired LAN with an Ethernet cable. Use the software that ships with the access point to assign an appropriate network name and an encryption key. More information

Make sure you turn on and properly configure your access point security settings so your internal network and the data that flows across it are inaccessible by the rest of the world. The Use it section provides more detail on how to use different wireless security tools to secure your network.

Activate the connections. Next, turn on the access point, activate the wireless connections for your devices and verify that they're all transmitting a wireless signal.

Review your user manual to find out how to be certain your wireless connections are on and transmitting. • On HP notebooks, a small blue light next to the wireless icon at the top of the keyboard is on when the notebook's wireless connection is operating. • If you have problems making your wireless connection, review the tips in your computer or handheld device's wireless connection troubleshooting guide.

Connect a Windows notebook or desktop PC to the network. To make a wireless connection from a desktop or notebook PC running Windows Vista, select Start > Connect To. The Connect to a network dialog box appears. Click the Set up a connection or network link and follow the prompts. To make a wireless connection from a desktop or notebook PC running Windows XP, select Start > Control Panel > Network Connections, and then click the Wireless Network Connection icon to open the Wireless Network Connection dialog box. Follow the prompts to connect to the wireless network.

Connect other devices to the network. Other devices, such as printers and PDAs, use different methods to make a wireless connection. Review your manual for specific instructions on how to connect each one. If you don't have a wireless printer, most ordinary printers

manufactured within the last year work well with wireless print servers. Just connect the printer to the wireless print server with a USB (Universal Serial Bus) or Ethernet cable, configure the print server as a node on your WLAN, set up the printer's port on the print server and then load the appropriate printer driver on the PCs and other devices that need access to the printer.

Secure your connections. After you install a wireless access point, you need to perform the initial setup on the device by: • Entering an IP (Internet Protocol) address with a port number (usually port 80) into a web browser to access a web page. • Issuing commands at a command prompt The devices are usually shipped from the manufacturer with default settings that are generally known or easily learned by the public, so you should change these immediately: • Default user name and password: Every boxed unit has some or no factory-specified administrative login and password. Change these to meet your company's administrative policy. That way, no casual or criminal discovery of your devices will provide an easy means for intrusion. • Default SSID (service set identifier): An SSID is the name you give each router or access point in your organization. The default name is usually specific to the manufacturer, which you should change to be site-specific but not easily discerned by the public. This includes eliminating any generic identifiers that can be spoofed or imitated by attacker-controlled wireless devices. • Default broadcast beacons: Many wireless devices announce their presence to the world, which can have a significant security impact on your business. Unless you offer an on-demand open-access wireless network, you should turn off beacon broadcasting, at least to the outside world, even though there are ways to still determine the SSID. • Automatic setup or zero-configuration: Some devices provide automatic connectivity or zero-configuration options for users to instantly bind to those networks it detects in its service area. Turn off this feature if your company doesn't need it for specific reasons. • Integrated firewall: In lieu of a proper organization-wide firewall, use any onboard functionality related to perimeter defense. Wireless access points and routers generally provide this level of capability, and you should particularly be concerned where wireless contact meets the wire. • Product placement: Perhaps the most crucial aspect to functionality – and to some extent, security – of a wireless access point or router is in its placement. Keep devices well out of reach from anyone who could change its settings or inputs, preferably secured within an enclosure. Also keep the devices far from outside walls and windows, whenever possible, to prevent accidental extension of your network beyond your building perimeters. • Access cut-off times: You can regulate if and when wireless access is provided to clients. If your business has no need for Wi-Fi after closing hours, schedule periods of inactivity so the device isn't available during those times.

Step 3: Test your setup Once you set up your network and devices, you should test your new wireless setup. A good test is not unlike a rehearsal for a play – you want to make sure everything's working before you go live. With several users and devices, work up a realistic scenario for an exchange of data, such as email and large files over the wireless LAN. Using link test software provided by such vendors as Agilent Technologies, you should test for the percent of data sent correctly, the time it takes to receive a response from the destination device and the strength of the transmitted signal.

Use it Data exchange on a wireless network functions just like data exchange on a wired network. However, because wireless communications are transmitted through the air rather than over a closed cable, you need to implement some wireless-specific security measures to ensure that your wireless communications are as secure as your wired communications. Wireless solutions use these primary tactics to maintain network integrity: • Encryption – WEP (at a minimum; not recommended), WPA or WPA2 encryption (highly recommended) • MAC address filtering • VPN security

Encryption Wireless products originally used the less-secure WEP (Wired Equivalent Privacy) protocol to help protect data transmissions from prying eyes. However, hackers quickly learned how to crack the 40-bit WEP encryption. Although WEP 128-bit encryption is stronger and more resistant to hacking, WEP is considered a nonviable security solution for most environments, most critically those with a business impact, and has been replaced by the much stronger WPA (Wi-Fi Protected Access) protocol. WPA and WPA2 (version 2) are available. Both are essentially built of a complicated software algorithm that scrambles data as it's sent and unscrambles it as soon as it's received, keeping data safe in transit. Tip: When you evaluate access points and wireless network adapters, be certain that you can integrate or at least easily upgrade to WPA/WPA2 encryption or newer standards as they emerge.

MAC addressing MAC (Media Access Control) address filtering restricts network access to authorized devices by assigning each network interface a unique hardware identification number. You can program the network access point to communicate only with approved MAC addresses, and it maintains these approved addresses in a password-protected table. Any attempts to access the wireless network by devices with unauthorized MAC addresses are denied. By itself, MAC address filtering doesn't adequately or fully provide a secure network medium; it merely provides a single component in a much larger security framework that must be consistent throughout the network. In addition, creating the MAC address filter list can be a time-consuming, mostly manual effort. Therefore, consider it a complementary security solution mainly for businesses with a relatively small number of networked devices. Tip: If you decide to incorporate MAC address filtering in your security setup, enable it as soon as you set up the access point.

VPN The best practice in wireless network security is to begin your security efforts at the front door to the network. You can use VPN (virtual private networking) technology to control which users outside of your system have access to it. A VPN is like a gateway to your network that authorized users who are on the outside (on the road, at a client site or working from home, for example) have to pass through before they can access any part of your network, wired or otherwise. Before any user is granted access to your wireless network, they should have to log on to your VPN and pass its authentication requirements. Organizations that enable remote access to networks almost always use VPN for control. Because VPN technology has been available for several years, many resources and tools are

available to help you set up VPN access. Don't view a VPN as a barrier to a wireless network, but rather as a common component that any network that allows outside access should include. Combined with MAC address filtering and WPA/WPA2 or newer wireless LAN protocols, VPN can make your wireless network highly secure.

Takeaway: Walk through the process of setting up a WLAN network card in XP. "I love it when things work like they're supposed to!" That has long been my favorite little catch phrase when setting up and configuring new IT solutions. Sadly enough, that phrase has become even more special to me because it's so rare that I actually get to say it when working with today's technologies. However, I was able to enthusiastically utter this phrase when configuring a wireless LAN connection using Windows XP. As I recently wrote, the most valuable new feature of Windows XP is the way that it seamlessly handles WLAN configuration and roaming. Now it's time to walk you through the process of setting up a WLAN network card in XP to prove just how intuitive it is. Install the WLAN network card Of course, the first thing to do is pop a WLAN network adapter into your system—and it's still best to do this while the system is shutdown. In most cases, you'll probably be putting a PC Card adapter into a laptop system. However, there are also PCI and USB adapters for desktop systems. For this example, I am installing an ORiNOCO Gold PC Card into a Dell laptop. I chose the ORiNOCO card because it had good reviews from industry experts and buyers, and I was happy with the choice; the card proved to have excellent range while holding a strong signal. I highly recommend the card for corporate installs. In my case, Windows XP was already installed on the system before I added the WLAN network adapter, but for the purposes of this tutorial, you will achieve the same effect by installing the WLAN card before loading Windows XP. If you had already installed a WLAN card (and its drivers and utilities) in a previous version of Windows, and you are now upgrading to XP, you need to watch out for a gotcha. Before upgrading to XP, uninstall the drivers and utilities that came with the WLAN card. If you don't, then you could run into some errors and conflicts with your WLAN configuration when you upgrade to XP. Verify that XP recognizes the WLAN card Once you power on your system, Windows XP should automatically recognize your WLAN card. (It has a vast database of WLAN adapter drivers built in.) After it is recognized, Windows will automatically add it to the list of available interfaces in Network Connections. To verify this: 1. Click Start | Control Panel. 2. Click Network And Internet Connections. 3. Click Network Connections. You should then see an icon that says Wireless Network Connection. Double-click that icon to bring up the Wireless Network Connection Status dialog box (Figure A). This should look familiar. It's basically the same as the Local Area Connection Status dialog box you see when you double-click on a standard Ethernet NIC, but there's one distinction. The wireless version has a nice little graphic with green bars to show the signal strength of your radio wave connection. Figure A

The WLAN status box shows the signal strength of the wireless connection. Configuring wireless networks When you're ready to configure your WLAN settings, click the Properties button. This will bring up the network settings properties (Figure B) that you're probably familiar with. They're the same as the network properties for a standard Ethernet NIC, but with one important addition: When you are configuring a WLAN network card, you will see a tab called Wireless Networks. Figure B

WLAN adapters have an additional configuration tab, Wireless Networks. Click on this tab, as we've done in Figure C. Now, you can configure your WLAN adapter to connect to various wireless access points (WAPs). Figure C

The Wireless Networks tab is where you handle WLAN setup. First, you'll need to make sure the Use Windows To Configure My Wireless Network Settings check box is selected. (This is the default setting.) You'll notice that there are two sections to this tab: Available Networks and Preferred Networks. In the Preferred Networks section, you can manually set up a connection to a WAP by clicking the Add button. You can then enter the Network Name (SSID) for the access point and set up Wireless Encryption Privacy (WEP), as shown in Figure D. Figure D

The Wireless Network Properties screen enables you to set up a connection to an access point.

Another way to connect to a WAP is to click the Refresh button in the Available Networks section. Windows will go out and look for nearby access points and give you a list of them. Just click on the one you want to use and then click Configure. This will pull up the same Wireless Network Properties screen that you saw in Figure D, only the Network Name will automatically be populated. After you tinker with the settings and click OK, the WAP will be placed on your list of Preferred Networks. Now, when you roam to new locations (especially ones that you'll probably be returning to later), you can simply let Available Connections find the access points, and you can add them to your preferred networks with a few clicks. When you return to that location, your laptop should then automatically connect you to the WAP, and you'll have network access without having to do any special reconfiguration. If you have multiple access points in a single location, you can add them all to your Preferred Networks list and simply use the Move Up and Move Down buttons to prioritize them. There's one more setting you should be aware of on this screen, which you can access by clicking the Advanced button. Here, you set your preference in terms of connecting to WLANs powered by access points or connecting to peer-to-peer WLANs (basically just connecting to other client machines that have WLAN network adapters installed). You also have a third option of connecting to Any Available Network, which will show you both of these categories. Obviously, in a corporate environment, you'll probably want to rely on access points. You'll also probably want to leave the Automatically Connect To Non-preferred Networks check box deselected. WLAN authentication and security Another nice feature of the Windows XP implementation of WLANs is that it has built-in support for IEEE 802.1X security. This makes it easy to require identity verification for WLAN adapters via a variety of standard authentication mechanisms including RADIUS, smart cards, and certificates. This can be configured on the Authentication tab (Figure E) of the network adapter's properties page. Figure E

The Authentication tab makes it easy to configure 802.1X security.

It's important to note that 802.1X security is not limited to WLANs. It can be used for standard 10/100 Ethernet connections as well. Basic monitoring and troubleshooting Once you make your WLAN connection, you can easily monitor the reception and bandwidth of your connection. First, go into the properties of your WLAN network adapter (which appears in Figure B). Then, select the Show Icon In Notification Area When Connected check box. This will put a small icon with two computers in the System Tray (in the lower right-hand corner of your screen). The icon will indicate when data is being sent over this network interface by changing colors. (The little computer screens change from navy blue to sky blue when data is moving.) When you hover your mouse over this icon, you'll see a screen tip displaying connection information. This includes the name of the wireless network that you are connected to (usually the WAP), the connection speed (in Mbps), and the signal strength of your radio wave connection (from Very Low to Excellent). Summary All in all, Windows XP greatly streamlines the configuration and implementation of WLANs. In addition, it improves functionality (especially roaming) and makes it easier to implement security features such as WEP and RADIUS. To my surprise, I even found that the WLAN client software that's built into XP is superior to the third-party drivers and utilities that come with WLAN cards for use in older versions of Windows. I found that in XP, the WLAN cards have an easier time locating and holding wireless connections, and they don't suffer from as many inconsistencies and hiccups. I have not been a huge fan of XP. However, its WLAN implementation is the one area where XP is head-and-shoulders above all previous versions of Windows client operating systems. If you want to configure laptops for extensive use of WLANs, you should definitely consider upgrading them to XP, especially if they are going to be roaming among different access points and/or different physical locations.

Related Documents

To Activate Win Xp
October 2019 11
Wireless Lan
June 2020 10
Win Xp
November 2019 22
Win Xp
May 2020 14
Wireless Lan
April 2020 10