Cisco WVC210 Administration Guide - Page 13

MAC Addresses, WEP Encryption, WPA/WPA2 Personal, WPA/WPA Enterprise, authentication - support

Page 13 highlights

Planning Your Wireless Network Security Threats Facing Wireless Networks 2 MAC Addresses-Enable MAC Address filtering. MAC addresses are unique identification numbers that are assigned to a device at the factory. MAC Address filtering allows you to provide access only to devices that you specify. This feature makes it harder for a hacker to access your network with a random MAC Address. WEP Encryption-Wired Equivalent Privacy (WEP) is an older encryption method that is not considered to be secure and can easily be broken. Select this option only if you need to allow access to devices that do not support WPA or WPA2. If you must use WEP, take the following precautions to make a hacker's job more difficult: • Use the highest level of encryption possible • Use "Shared Key" authentication • Change your WEP key regularly WPA/WPA2 Personal-WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption. A network encrypted with WPA/ WPA2 is more secure than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. To protect the information as it passes over the airwaves, you should enable the highest level. WPA/WPA Enterprise-Enterprise refers to using RADIUS server for authentication, while RADIUS stands for Remote Authentication Dial-In User Service. This type of authentication requires some advanced expertise because it involves setting up a RADIUS server for authentication and, in some cases, creation of certificates for both the RADIUS server and the camera. If you are using WPA/WPA2 Enterprise security, you will need to upload security certificates to the camera. Certificates must be in the following format: • Root certificate: DER encoded binary x.509 (CER/PEM) • User certificate: Personal Information Exchange (PKCS#12(.PFX)) Implementing encryption may have a negative impact on your network's performance, but if you are transmitting sensitive data over your network, encryption should be used. These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Cisco has to offer. WVC210 Wireless-G PTZ Internet Video Camera With 2-Way Audio Administration Guide 7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85

Planning Your Wireless Network
Security Threats Facing Wireless Networks
WVC210 Wireless-G PTZ Internet Video Camera With 2-Way Audio Administration Guide
7
2
MAC Addresses
—Enable MAC Address filtering. MAC addresses are unique
identification numbers that are assigned to a device at the factory. MAC Address
filtering allows you to provide access only to devices that you specify. This feature
makes it harder for a hacker to access your network with a random MAC Address.
WEP Encryption
—Wired Equivalent Privacy (WEP) is an older encryption method
that is not considered to be secure and can easily be broken. Select this option
only if you need to allow access to devices that do not support WPA or WPA2.
If you must use WEP, take the following precautions to make a hacker's job more
difficult:
Use the highest level of encryption possible
Use “Shared Key” authentication
Change your WEP key regularly
WPA/WPA2 Personal
—WPA stands for Wi-Fi Protected Access, which is a
security standard stronger than WEP encryption. A network encrypted with WPA/
WPA2 is more secure than a network encrypted with WEP, because WPA/WPA2
uses dynamic key encryption. To protect the information as it passes over the
airwaves, you should enable the highest level.
WPA/WPA Enterprise
—Enterprise refers to using RADIUS server for
authentication, while RADIUS stands for Remote Authentication Dial-In User
Service. This type of authentication requires some advanced expertise because it
involves setting up a RADIUS server for authentication and, in some cases,
creation of certificates for both the RADIUS server and the camera.
If you are using WPA/WPA2 Enterprise security, you will need to upload security
certificates to the camera. Certificates must be in the following format:
Root certificate: DER encoded binary x.509 (CER/PEM)
User certificate: Personal Information Exchange (PKCS#12(.PFX))
Implementing encryption may have a negative impact on your network’s
performance, but if you are transmitting sensitive data over your network,
encryption should be used.
These security recommendations should help keep your mind at ease while you
are enjoying the most flexible and convenient technology Cisco has to offer.