Wednesday, August 22, 2012

Netgear Faq: Netgear 192.168 Password

Paul asks…

Netgear password problem for my itouch?

i just got an itouch and I have Netgear Wi Fi
but it was asking for a password
so i went into 192.168.1.1
and i changed the password right
but then it wouldnt log me in on my itouch
when i type that password in
idk whats wrong.. what do i do? anyone can help me?

netgear answers:

What type of encryption did u use?
Change it to WEP

the most basic encryption.. Probly the one you have right now is too strong for itouch..

*i dont own itouch. . ;p

Chris asks…

My dad forgot his username & password for netgear (web: 192.168.0.1) what happen if he forgot the information?

Right now, he cant log onto his own email, go to google or anything the only programs he can use is little kid's website. Lately, he has been using mine, then sooner or later my computer needs repair.

netgear answers:

Reset The Router.

There should be a small reset button on the router.

When you press the button in you will bring it back to factory specifications.

You will need to re set everything up all over again once you reset the router.

Thomas asks…

Setting a password for Netgear?

Im trying to set a passowrd for my netgear as my neighbours are backing off mine. I set a password on the 192.168.1.1 website, and still did not put a passowrd on actually connecting the computer.

Btw, I don't have the discs. Can anyone help me please?

netgear answers:

You manage routers with their built-in web management software -- no CD or software needed, only a browser navigated to the box, from Linux, Mac, UNIX, Windows, etc. Here's your Netgear's connection link as a clicky: http://192.168.1.1/

What you did was to password-protect administration of your Netgear box itself -- important to do, but doesn't affect wireless security. Be sure Remote Management | Turn Remote Management On is NOT checked, then you'll need to change your Netgear wireless security to something like this:

From a WIRED connection to the Netgear,
* Under Wireless Settings, check the WEP radio box.
* Under Security Encryption (WEP), select Open System and 128-bit security.
* Under Security Encryption (WEP) Key, type a phrase and generate. Then write down the hexadecimal number that appears in the 4 key boxes. For now, all Keys will be the same -- but we'll return here later.
* Confirm that Key 1 is selected.
* Apply your new wireless security settings.

That finishes the router part for now. Next, from every wireless device to be connected, update your wireless card configuration to match your new security settings by setting security to WEP and entering that new hexadecimal password. Your wireless devices should now connect. The neighbors will already be begging you to let them on because they are kicked off.

You could use more sophisticated security -- the three other choices on that same Netgear menu. But, not all wireless cards support WPA modes. I've got an old D-Link card that can't, because the vendor never released an updated driver for Windows after WPA was invented, and won't tell the Linux gurus how to do a non-proprietary driver.

Despite popular opinion, WEP is pretty secure -- especially if you follow these methods and understand how an attack works. There are some script-kiddie tools out there for breaking WEP, but breaking 128-bit WEP encryption takes at least 30 minutes of monitoring heavy wireless traffic and analysis with a fast, 4-core computer. The cracking works ONLY if there's an active wireless connection to your router to manipulate, AND if a wireless device Stays Connected long enough for the "attack" to gather lots of packets to analyze.

By disconnecting all wireless devices when they're not in use, nobody can break in because they can't generate traffic to analyze. While connected wirelessly, just keep an eye out for the whole network slowing down and for activity lights flickering like crazy when you're not downloading from the Internet. It's easy to notice this "flooding attack" if they try. Remember you've got 30 minutes or longer to react -- and if you react properly, you can set a booby trap -- by changing to a new password -- so they're just wasting their time.

If you notice an attack,
* shut down the wireless cards to end the attack (but not the router, they'll suspect something's up), and
* change the wireless password on the router and all computers. That's why those other password choices exist -- and the active one was potentially exposed, so go back and change it later it so it won't come up again.
* go ahead and use a wired connection if you like -- if the "flood attack" is still going on, using wireless may slow your whole network until they give up.

Unless the attackers clear their data cache and launch a fresh attack, they'll now need several hours for breaking your WEP -- because of the "no longer applies" data they gathered. And if you limit connections with MAC addresses, they'll never connect even if they succeed, because the correct password just won't connect for them.

I use WEP plus a MAC list -- set your MAC list up at Advanced | Wireless settings, then click the Setup Access List button. This allows connections only from known MAC addresses -- no matter what security encryption is used -- even no encryption. MAC addresses can be spoofed, but the neighbors probably won't know what your wireless card MAC addresses are -- or suspect that it matters.

Your Netgear can report to you all the MAC addresses currently connected to it. Go to Maintenance | Attached Devices.

To really be ready to fiend off attacks, fill out alternate passwords in that list you noted above, so changing passwords is a fast click on the same-numbered radio button at every machine. Test them out carefully -- and you've got real security.

About that router access password: change it to something VERY difficult. Gaining administrative access to your router is the EASIEST attack of all, so don't let it happen. If they crack your administrative password and are smart, they'll see your router's MAC list and your wireless passwords -- game over. In that case, hard-reset the router and start over on everything. So -- again -- be sure Remote Management | Turn Remote Management On is NOT checked and they can't even try to crack your network unless they're already connected.

Sorry to be so long-winded. Been there, done that, got the tee-shirt to prove it. Good luck!

Powered by Yahoo! Answers

No comments:

Post a Comment