On the wire(les)s of our nerves.
Nov. 26th, 2005 05:35 pmI finally cracked and bought a wireless AP/switch/router, (A WRT54G, so I can play with OpenWRT in the future) and I'm idly considering how to plumb it into my existing lash-up.
I could do it the Oakley way, which requires that I bung another NIC in thewall BSD box and configure that as router/firewall (which it's already doing well enough).
Or I could bung the wireless kit ahead of the BSD box and create a DMZ such that if/when the wireless is cracked, the winders kit is still behind the BSD firewall. This is going to mean multiple levels of NAT and some extra jiggery-pokery to allow inbound SSH.
Or put the wireless kit behind the BSD box and hope that WPA is good enough and works with BSD-6.0.
Or some other arrangement.
Ideas? War (driving) stories?
I could do it the Oakley way, which requires that I bung another NIC in the
Or I could bung the wireless kit ahead of the BSD box and create a DMZ such that if/when the wireless is cracked, the winders kit is still behind the BSD firewall. This is going to mean multiple levels of NAT and some extra jiggery-pokery to allow inbound SSH.
Or put the wireless kit behind the BSD box and hope that WPA is good enough and works with BSD-6.0.
Or some other arrangement.
Ideas? War (driving) stories?
no subject
Date: 2005-11-26 06:19 pm (UTC)no subject
Date: 2005-11-26 06:43 pm (UTC)no subject
Date: 2005-11-26 08:52 pm (UTC)Switch on WPA, or WEP (not as secure but good enough if you use 128bit)if you dont have WPA.
Switch on MAC Address filtering, if you have it.
You end up with a system that, if you keep your wep keys secret, that is prity secure from everybody but the the spooks :)
no subject
Date: 2005-11-26 09:30 pm (UTC)no subject
Date: 2005-11-27 10:19 am (UTC)I'd go WPA-PSK - straightforward, simple etc. If you put your AP on a separate network, is it going to achieve anything? If somebody cracks it, they're going to have the same level of access as you would...
For our home VPN users at work, I set up two DHCP scopes on every router - one to give out corporate addresses to certain MAC addresses, and another one to give 192.168.1.x addresses to anything else. Reasoning? Even if you crack the WEP, you'll still get a 192.168.x.x address (unroutable on the WAN, local NAT on the router only) and get what you want - Internet access.
no subject
Date: 2005-11-27 12:14 pm (UTC)Correctly configured WPA is sufficiently strong on its own not to bother any further. I only did my hotspot-VPN jobbie because 1) I wanted to run a public hotspot and 2) my wifi access point only supported WEP.