How I can know that someone attemping to access my wireless

Discussion in 'Tomato Firmware' started by winwin, Aug 22, 2007.

  1. winwin

    winwin LI Guru Member

    Hi, all

    I am using tomato and would like to get recommend about how to log for an attemping to access my WRT54 wireless lan.

    Any one has a recommend, please.

    Thank you.
  2. Morgs

    Morgs LI Guru Member

    I'm curious about this too. I can't find anywhere in the firmware to see connected devices??
  3. Jetster12

    Jetster12 LI Guru Member

    Its under Status
    second item, Device list
    Every time someone trys to log into your network it logs the MAC address and it stays there even if they disconnect. If they dont know your security key then it does not give them a IP address. If your network is unsecured or they figure out the key then a IP is given to them. If you click on the MAC address you can add them to the MAC filter and block them.

    In the device list it reports weather they are connected by

    Eth1 = wireless plus signal strength
    Bro = wired or no connecting at this time
    Vlan1 = Wan port

    At least this is what I figured out
  4. Morgs

    Morgs LI Guru Member

    Excellent, thanks Jester, that at least answered my question
  5. winwin

    winwin LI Guru Member

    It is a good way!. at least, we can monitor real time that who are connecting or trying to connect to our network. However, with WRT54 command line, what is the command to enable us to get that information? / in case it has, so we might write a shell script to records and block them automatically.

    Any help please.
  6. mikester

    mikester Network Guru Member

    This topic was covered before - do a search for WALLWATCHER
  7. radikaled

    radikaled Guest

    In the interest of proactively securing your network here are several easy things you could do:

    - Create a whitelist of allowed MAC addresses on your wireless network

    - Limit the amount of DHCP leases you give out (e.g. hand out only 8 leases between .100 - .107)

    - Use static DHCP leases

    - Use static IP's

    - Use a combination of everything mentioned

    The effectiveness of the last 3 suggestions are limited to NOT using typical class C addresses (e.g. 192.168 or 10.10. etc...)
  8. azeari

    azeari LI Guru Member

    well just a note: all the measures mentioned by radikaled will only protect you against the casual wireless hacker, and is easily broken by slightly more persistent ones.

    for the security conscious, just use wpa2 encryption (=
  9. ifican

    ifican Network Guru Member

    wpa or wpa2 should be suffient as long as you use a strong key. Both are susceptable to offline brute force attacks but if you use a really long key it would take far to long to break to be useful.
  10. mikester

    mikester Network Guru Member

    Turning off the wireless when not in use is a good idea too. On only during certain times of day etc.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice