DESKTOP

Configuring Windows 7 NIC Devices (part 2) - Configuring Wireless NIC Devices

6/30/2011 4:08:12 PM

3. Configuring Wireless NIC Devices

Wireless technology has matured to the point of becoming cost-effective and secure. The use of wireless network adapters is increasingly popular, scaling well out of the home and into the workplace. Windows 7 supports wireless autoconfiguration, which makes wireless network connections easy to use. Windows 7 will automatically discover the wireless networks available and connect your machine to the preferred network. Although conveniently connected, there are still considerations to take into account—namely, security.

3.1. Configuring Wireless Network Settings

If you have a wireless network adapter compatible with Windows 7, it will be automatically recognized by the operating system. This can be a built-in adapter such as most modern laptops come with, a wireless card you install in the machine, or even a wireless USB adapter. After it is installed, it is recognized and shown in Device Manager as well as the Network and Sharing Center within the View Your Active Networks section.

We used Device Manager in the previous section for the network adapter configuration, so let's use the Network and Sharing Center for the wireless network configuration. Figure 6 shows the Network and Sharing Center with two active networks, the Wireless Network Connection and the wired Local Area Connection.

Figure 6. Network and Sharing Center

You can view the Network and Sharing Center a few different ways. You can perform any of the following steps to access the Network and Sharing Center:

  • Choose Start and type Network and Sharing Center in the integrated search box of Windows 7.

  • Choose Start => Control Panel => Network and Internet => Network And Sharing Center.

  • Choose Start, and then right-click Network and select Properties from the context menu.

3.2. Viewing the Wireless Network Connection Status

From the Network and Sharing center, you have easy access to the Wireless Network Connection Status. The Wireless Network Connection Status window gives you an initial look at the status by providing the layer 3 connectivity status (IPv4 and IPv6), media state, service set identifier (SSID) being used, how long the connection has been active (Duration), the negotiated speed of the connection, and the signal quality. The Wireless Network Connection menu choice of the Network and Sharing Center and the Wireless Network Connection Status window are shown in Figure 7.

Figure 7. Wireless Network Connection Status

The Details button of the Wireless Network Connection Status window provides, as you probably guessed, detailed information including the actual physical address (layer 2), logical address (layer 3), dynamic addressing parameters (DHCP), name resolution items, and more. After verifying physical layer parameters, this area of properties and status is a great place to verify or troubleshoot logical (driver/software) issues.

3.3. Viewing Wireless Network Connection Details

If you have a wireless adapter in your machine, perform Exercise 1 to view the Network Connection Details for your Wireless Network Connection.

Exercise 1: Viewing the Network Connection Details

  1. Choose Start and type Network and Sharing Center in the Windows 7 integrated search window; press Enter.

  2. Select the Wireless Network Connection menu item from the View Your Active Networks section.

  3. Click the Details button.

  4. Review the Network Connection Details for this connection.


The Wireless Network Connection Status window has an Activity section showing real-time traffic (in bytes) being sent from and received by the wireless network. From the Wireless Network Connection Status window, you also have access to the Wireless Network Connection Properties, which includes access to the wireless adapter configuration pages.

You access the properties page by clicking the Properties button in the Activity section (not the Wireless Properties button in the Connection section; you can identify these buttons as shown previously in Figure 7). The Wireless Network Connection Properties window is shown in Figure 8.

Figure 8. Wireless Network Connection Properties window

The Wireless Network Connection Properties page has a Networking tab that shows which network adapter is being used for this connection (which you can change if you have more than one available). There is also a tab for configuring Internet Connection Sharing (ICS), which allows other users on your network to access resources through this machine's connection. The This Connection Uses The Following Items section displays the various clients, services, and protocols that are currently available for this connection.

You can install or uninstall network clients, network services, and network protocols by choosing the appropriate button. You can also view the client, service, or protocol properties if they are available by choosing the Properties button for the selected item (if the Properties button is gray, a properties page is not available for the item). From the Wireless Network Connection Properties window, you even have access to the network adapters' hardware configuration property pages. These are the same pages you have access to from Device Manager.

Perform Exercise 2 to access the network adapter properties from the Wireless Network Connection Properties page.

Exercise 2: Viewing Wireless Network Connection Properties

  1. Choose Start and type Network and Sharing Center in the Windows 7 integrated search window; press Enter.

  2. Select the Wireless Network Connection menu item from the View Your Active Networks section.

  3. Click the Properties button from the Activity section.

  4. Click the Configure button.

  5. View the various tabs regarding the network adapter properties.

  6. Choose Cancel to return to the Wireless Network Connection Status window.


3.4. Configuring Wireless Network Security

Wireless network security is a very large piece of setting up our wireless networks. The focal point for this is the wireless access point or wireless router to which we connect.

Wireless Connection: Infrastructure or Ad Hoc?

We should point out here that you might not always be connecting to an access point or router; these connections are considered infrastructure mode connections. An infrastructure mode connection is similar to our wired connection of a PC to an outlet. Instead, you might connect in an ad hoc fashion, which could be a computer-to-computer connection to share information with other wireless network devices without another wireless device acting as an intermediary.

Ad hoc connections exist in our wired environment as well, as we would connect two PCs' NICs together by using an Ethernet crossover cable. Securing data transfer in an ad hoc setup is equally important as it is in infrastructure mode, as the data is still traversing between devices using radio frequency (RF), and network sniffers today running the wireless adapter promiscuously (in monitor mode) have no problem viewing the data stream. If the data stream is not encrypted, the sniffers will have access to it.


Whether you are using a small wireless network or a large wireless infrastructure, you should have a plan for secure communication and should configure wireless network security. There are several basic parameters you can configure on your network access devices to increase the security of a wireless network:

  • Disable broadcast of the SSID, which is the name of the wireless network. When SSID broadcast is disabled, the wireless network cannot be detected automatically until you manually configure your wireless network card to connect to that SSID.

  • Create a Media Access Control (MAC) address filter list so only specifically allowed wireless devices can connect to the wireless network, or require users attempting to connect to supply connection credentials.

  • Enable encryption such as Wi-Fi Protected Access (WPA) or WPA2.

For large implementations, there are several vendors supplying wireless access points under the control of a wireless director, soft ware-based controllers that are responsible for allowing access points on the network, providing user access control, and enforcing encryption policies. For smaller implementations, this control functionality is done manually as the wireless routers or access points are set up.

The security policies put in place are configured on the wireless access device and the wireless client. The Windows 7 client components in our case must be set up to match the security settings of the wireless network access devices.

During the setup of most wireless access devices provided by the hardware vendor, the administrator will configure the security parameters. Configuring can be done during the setup program and/or through a web browser that can access the wireless access device configuration pages.

Most of our current devices have a built-in web server to allow the HTTP connection from a web browser, Windows 7 also has the ability to configure the wireless access device if the hardware vendor makes it available. If there is no specific component written, you can launch the web-browser-based configuration from a convenient location—the Network and Sharing Center.

In Exercise 3, you will perform the following steps to see how to initiate a Windows 7 wireless access point configuration.

Exercise 3: Configuring a Wireless Access Point

  1. Choose Start and type Network and Sharing Center in the Windows 7 integrated search window; press Enter

  2. Choose the Set Up A New Connection Or Network option.

  3. Choose Set Up A New Network to configure a new router or access point and then click Next.



  4. Select the wireless access device you want to configure from the Set Up A Network window and click Next.



  5. Depending on your device, you might be asked to enter a PIN or other identifying parameter to access the device. Enter the PIN and click Next.

  6. On the next screen, you will be able to configure the security settings dictated by the wireless security policy to be implemented. The settings defined here need to be configured for each client machine connecting to the wireless network. After making the setting choices, click Next.



  7. The configuration of the wireless network device completes, and you are given a confirmation window. Click Finish to close the window.


Whether you have Windows 7 configure the wireless network connection or you have performed the setup through the manufacturer's process, you still need to configure your Windows 7 client access.

If you have performed the simplest configuration, and there are no security parameters configured (bad idea, by the way), Windows 7 will connect automatically with a quick window showing the wireless network it's connecting to and providing access without much user intervention. Even cancelling the screens will produce a successful (nonsecure) connection. This simple configuration process makes connecting a home or small network easy and straightforward for nontechnical users. However, this is not a good solution.

If you have configured wireless network security (a good idea, by the way), then you need to configure the Windows 7 client with the correct settings. Once again, the configuration screens are available from a convenient location known as the Network and Sharing Center.

In Exercise 4, you will perform the following steps to access the Windows 7 client wireless network properties.

Exercise 4: Accessing the Windows 7 Wireless Properties

  1. Choose Start and type Network and Sharing Center in the Windows 7 integrated search window; press Enter.

  2. Choose the Wireless Network Connection item within the View Your Active Networks section of the Network and Sharing Center.

  3. Click the Wireless Properties button within the Connection area of the Wireless Network Connection Status window.



  4. The Wireless Network Properties tabbed dialog box opens, displaying the current setup for the wireless network.


Figure 9 shows the Connection tab of the Wireless Network Properties tabbed dialog box. From this dialog box, you have the ability to set or change the Windows 7 client configuration.

Figure 9. Wireless Network Properties tabbed dialog box

The first tab of the Wireless Network Properties tabbed dialog box is the Connection tab, which displays the following information:

Name The name assigned to the wireless network.

SSID The service set identifier (SSID) of the wireless connection. This defines a friendly name for the wireless network. This is normally an ASCII string and is usually broadcast by default, allowing a machine or users to select a wireless network with which to connect. Some wireless access devices will allow more than one SSID to be available (broadcast) at the same time, creating more than one wireless network within the same device.

Network Type Displays the mode the wireless network is operating in. If the wireless network is in infrastructure mode, this parameter will be Access Point. If the wireless network is ad hoc, this will display Computer-To-Computer.

Network Availability Displays to whom the wireless network is available—All Users or Me Only, for example.

The Connection tab of the Wireless Network Properties tabbed dialog box provides the following types of configuration:

Connect Automatically When This Network Is In Range This option, when selected, allows automatic connection for this wireless network. Deselecting (clearing the check mark) requires the user to select this wireless network for connection.

Connect To A More Preferred Network If Available Windows 7 will attempt to connect to a preferred network (if the Connect Automatically choice is selected). If there is more than one preferred network, Windows 7 might switch back and forth if they are both available at the same time. Clearing this check mark allows the currently connected network to stay connected until it is no longer available, possibly preventing the dropping of data or even dropped connections.

Connect Even If The Network Is Not Broadcasting Its Name (SSID) If the wireless network you are attempting to connect to is not broadcasting its SSID, you must select this option to allow Windows 7 to automatically connect.

There is one more option on the Connection tab of the Wireless Network Properties tab; it is the link to Copy This Network Profile To A USB Flash Drive. Selecting this link launches the Copy Network Settings Wizard, as shown in Figure 10.

Figure 10. Copy Network Settings Wizard for the wireless connection

After inserting a USB flash drive, the currently configured wireless network configuration is saved in the form of a setupSNK.exe program and a folder named SMRTNTKY with the configuration parameters. Caution should be exercised to protect this information because all the configuration parameters (including security keys) are stored in clear text.

After the files and folder are created and saved, you are presented with a confirmation screen with simple instructions and a link for the detailed information about wireless network configuration. The confirmation page is shown in Figure 11.

Figure 11. Wireless connection copy confirmation window

The second tab on the Wireless Network Properties tabbed dialog box is the Security tab. This tab allows the configuration of the security parameters as defined in your security policy and configured on your wireless network access devices.

Figure 12 shows the Security tab, the Security Type drop-down box selecting the WPA2-Personal Security choice, and the Encryption Type selecting AES (Advanced Encryption Scheme). You can also see the Network security key as clear text because the Show Characters check box is selected.

Figure 12. Wireless Network Properties Security tab

NOTE

When it comes to WPA, there are two versions: WPA2-Personal and WPA2-Enterprise. WPA2-Personal allows you to set up WPA2 by using a shared password key. WPA2-Enterprise allows you to set up WPA2 by using a server for verification.

3.5. Troubleshooting Wireless Connectivity

There are a few common issues with wireless networking you can look at if you're having problems connecting to your wireless network. Following are a few problems and solutions:

Ensure that your wireless card and the access devices are compatible. Cards that are compatible with the 802.11b standard can connect to only 802.11b or 802.llb/g access devices configured to accept b. Cards using 802.1 la can connect to only 802.Ua or 802.1 la/b/g access devices configured to accept a. An 802.1 In card needs to connect to an 802.1 In access device for efficiency (although most will auto-negotiate to the best spec available). The specification you're using on the card has to be available and turned on in the wireless access device.

Ensure that your wireless network card is enabled. Here's a good one I see regularly; Many newer laptops and tablets have either a switch or a hot-key setting that enables and disables the wireless device. Often a laptop switch will somehow be turned off, or some user will somehow arbitrarily press the key sequence to shut off the PC's wireless radio. The physical layer always seems to be a good place to start looking.

Ensure that the access point signal is available. I find radio frequency (RF) to be a funny thing. You can't see it and you assume that it is everywhere. Not a good assumption. The output power of the signal might be fine, but the RF power is absorbed (okay, we say attenuated) as it goes through walls, insulation, or water (which is the main component of leaves). You need to make sure there is nothing that might be causing interference of the wireless signal.

Ensure that the security parameters are configured alike. The SSID, encryption type, encryption algorithm, and passphrase/security key have to be set the same on both the wireless access device and the wireless client. Here's another one I see quite often: In the desire to make the initial setup and the secure setup easier for end users, some hardware vendors have a nice little button that allows the network access device to negotiate a secure set of parameters with the client. In one instance, after the wireless network had been working correctly for a while, a failure showed the parameters to now be incompatible, thanks in large part to someone pressing the easy button just before the failure.

Ensure automatic connections if the SSID is not being broadcast. If you are having trouble connecting to a network that does not broadcast its SSID, select the Connect Even If The Network Is Not Broadcasting check box in the Wireless Network Properties dialog box. I have solved several wireless network connection issues with this fix.

One final thought on troubleshooting in the wireless world: Many times when I go into a small or midsized network, I find that the company (or home user) is connected to a multifunction type of device. These little pieces of plastic we purchase (and call wireless routers) are really quite technologically sophisticated. Think of one of these wireless routers; they have switch ports for connecting hard-wired devices on the private network as well as an Internet port to connect to the outside world. The wireless portion of the device is more like another switch port on the private side than anything else, allowing the wireless devices to interact with the hard-wires.

When I troubleshoot and eliminate issues, I start with the hard-wired devices, and see whether they can communicate to each other and the outside (the other side of your wireless router). Try to communicate between the hard-wired and wireless as well, to eliminate the router components. Oh yeah, it's also not the best idea to use the wireless network to configure the wireless devices. Configuring through the wireless interface will ultimately cause you to lose connectivity in the middle of a configuration and may force you to connect with the cable, leaving the access point unusable until you complete the task you started wirelessly.

Another item that we need to configure before we can connect a Windows 7 machine to the domain is the protocol that will allow the Windows 7 machine to communicate with other machines.
Other  
  •  Windows 7 : Configuring Network Connectivity - Understanding Networking
  •  Preparing to Install Windows 7 (part 2) - New Install or Upgrade
  •  Preparing to Install Windows 7 (part 1) - Different Versions of Windows 7 & Hardware Requirements
  •  Maintaining Windows 7 with Backup and Restore (part 2) - Using Advanced Backup Options & Using System Protection
  •  Maintaining Windows 7 with Backup and Restore (part 1) - Creating a Backup & Restoring Files from a Backup
  •  Windows 7 : Configuring Backups and Recovery - Using Advanced Boot Options
  •  Windows Server 2003 : Implementing a GPO (part 2) - Modifying a GPO
  •  Windows Server 2003 : Implementing a GPO (part 1)
  •  Windows 7 : Using Windows Live Calendar (part 3) - Scheduling Appointments and Meetings & Viewing Agendas and Creating To-Do Lists
  •  Windows 7 : Using Windows Live Calendar (part 2) - Sharing Your Calendars with Others & Synchronizing Google Calendar with Windows Live Calendar
  •  
    Most View
    SQL Server 2008 : Policy-based management - Policies in action (part 1) - Importing policies from file, Evaluating policies
    Managing Windows Server 2012 (part 12) - Using Remote Desktop - Remote Desktop essentials, Configuring Remote Desktop
    Sharepoint 2010 : Making Search Work - How SharePoint Search Works
    47 Ways To Speed Up Your PC for Free! (Part 3)
    Doubling Up On Drivers KEF M200
    Lenovo ThinkPad Tablet 2 Review (Part 3)
    Microsoft Lync Server 2010 : Determining the Scope of the Deployment
    Nokia Lumia 620 Review - Basic Smartphone With Good Performance And Stunning Design (Part 2)
    PlayStation Goes Fourth (Part 1)
    Thermaltake Toughpower Grand PLATINUM 700W
    Top 10
    Teenage Kicks - Britain's Youngest Hot Rodders (Part 3)
    Teenage Kicks - Britain's Youngest Hot Rodders (Part 2)
    Teenage Kicks - Britain's Youngest Hot Rodders (Part 1)
    Swing Low Sweet Chariot Muscle Car
    The 25-year Rule (Part 2)
    The 25-year Rule (Part 1)
    Review : Linksys EA9200 Tri-Band Smart Wi-Fi router
    Review : Xiaomi Mi Pad
    Identity on Cisco Firewalls : Administrative Access Control on ASA
    Identity on Cisco Firewalls : Administrative Access Control on IOS