Wireless AP Question

Discussion in 'Macintosh Computers' started by e²Studios, Apr 15, 2005.

  1. e²Studios macrumors 68020

    e²Studios

    Joined:
    Apr 12, 2005
    #1
    I currently have a Cisco Pix sitting as the router/firewall on my network; i do not need a all in one wireless router and WAP conbo deal as i think the routing and firewall portion would be a downgrade from what im currently using now. Currently for Wi-fi i have a Linksys WAP11 and i would like to get a Wireless G Access Point. From what ive seen All the airport bases are router/firewall and access points correct? Is there a WAP that Apple makes that will work with my Cisco gear and only act as a access point and not as a router/firewall? Currently im beginning to think the Linksys WAP54G is probably my best bet but before i went and ordered it i figured i would get some opinions from here.

    Thanks
    Ed
     
  2. MacTruck macrumors 65816

    MacTruck

    Joined:
    Jan 27, 2005
    Location:
    One Endless Loop
    #2
    Get the Linksys. It is accessible through the web which makes it easy if you have a pc and its cheaper isn't it? I have the WRT54G and I love it.
     
  3. e²Studios thread starter macrumors 68020

    e²Studios

    Joined:
    Apr 12, 2005
    #3
    From amazon i believe its $65 for the WAP54G, the cheapest apple one was $199 if i remember right. Is there a big concern to the WAP54G only supporting WEP and not WPA?

    Ed
     
  4. MacTruck macrumors 65816

    MacTruck

    Joined:
    Jan 27, 2005
    Location:
    One Endless Loop
    #4
    Dang, thats a big price difference. I use wep and think its secure enough. If someone can hack wep they can hack wpa. I would go with linksys.
     
  5. MacTruck macrumors 65816

    MacTruck

    Joined:
    Jan 27, 2005
    Location:
    One Endless Loop
    #5
    Another feature that the linkys has and maybe the apple has it not sure is the mac address filter (not to be confused with Mac/Apple). Each network card has a MAC address assigned to it. Its like a serial number embedded in. On your router you can assign which addresses are allowed in and this is done in addition to wep. Now you can hack that too by spoofing the mac address and flashing your card with that number but come one, that has to be either the KGB or a really bored teenager that massively hates you. Ofcourse if you are a terrorist then know that the CIA and FBI can hack your system in 2 seconds. :eek:
     
  6. e²Studios thread starter macrumors 68020

    e²Studios

    Joined:
    Apr 12, 2005
    #6
    I use MAC address filtering atm with my current Linksys AP :) its a great feature to keep the neighbors kids from using my link to search for whatever it is teenagers search for these days... :D

    Ed
     
  7. Westside guy macrumors 601

    Westside guy

    Joined:
    Oct 15, 2003
    Location:
    The soggy side of the Pacific NW
    #7
    This is absolutely wrong. WEP is intrinsically insecure. The WPA protocol is considered very secure. There have been no known WPA-specific hacks.

    The "news" that went around a couple months ago, where someone was saying "this is how WPA can be attacked", turned out to just be a standard dictionary attack. In other words if the password is poorly chosen you can brute force it. This has nothing to do with WPA - it's equally true of any security protocol (UNIX password hashes, SSH, etc.).
     
  8. MacTruck macrumors 65816

    MacTruck

    Joined:
    Jan 27, 2005
    Location:
    One Endless Loop
    #8

    So you are saying NOBODY could ever hack WPA? Anything written in computer code can be hacked. The fact you think WEP is so insecure is because its been around longer and has had more time for people to crack it. Nothing is foolproof.

    Cops use radar to detect speeders, speeders use radar detectors, Air Force uses stealth to fool radar detectors, someone will come out with stealth detector.
     
  9. Westside guy macrumors 601

    Westside guy

    Joined:
    Oct 15, 2003
    Location:
    The soggy side of the Pacific NW
    #9
    No, WEP is insecure because it was poorly designed. This is very widely know and well documented - do a little research and you'll see what I mean. WEP is intrinsically flawed. It was easily cracked by people who analysed the design of the protocol and showed that it was impossible to make WEP secure.

    It's somewhat analogous to the difference between SSH protocol 1 and SSH protocol 2. Of course it's always possible someone will find a flaw in the newer protocol - but it hasn't happened yet. Saying "it might be cracked in the future, so it's no better than this older protocol that is demonstrably broken" is a rather difficult argument to support.
     
  10. superbovine macrumors 68030

    superbovine

    Joined:
    Nov 7, 2003
    #10
    He was only trying to point out that WPA was specifically designed to replace WEP because of it security flaws. So, yes WEP has been around longer, and was proved insecure so IEEE 802.11 group designed an encryption scheme to fix the flaws called WPA. Yes, it has been around longer, but it had it's design flaws. I am not saying WPA is perfect, but your understanding of the situation is wrong.

    http://wifinetnews.com/archives/002594.html

    http://www.nwfusion.com/news/tech/2003/0526techupdate.html

     

Share This Page