Belkin PF31 Specifications Page 35

  • Download
  • Add to my manuals
  • Print
  • Page
    / 46
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 34
206
|
Chapter 7: Bluetooth
Our setup so far has no security considerations. There are several steps one
can take to improve the security situation:
Require username/password authentication for the PPP setup; see the
pppd documentation for how to do this.
Configure your Bluetooth device to always use link-level encryption in
hcid.conf.
You should rely on neither of these to provide more than basic security.
Bluetooth is still a relatively new technology, and its security measures have
not yet been subjected to many attacks in the wild. It’s always best, if the
remote device is capable of it, to assume link-level security is weak and to
use secure connection tools such as ssh to encrypt your network traffic at the
application layer.
Connecting to a LAN access server
The dund program can be configured to connect to a known LAN access
point or to search for one and connect to it. Here are the command lines for
these two functions:
dund --connect 11:22:33:44:55:66
dund --search
You can also specify a PPP configuration file by appending the call keyword
and the name of the configuration in /etc/ppp/peers/ to the command line.
Personal Area Networking
While you can achieve much with file transfers via OBEX and point-to-point
networking with PPP, devices can take the full advantage of being inter-
linked in the same way that Ethernet networks are. They can then run proto-
cols such as IPv4, IPv6, and IPX. For this reason, the Bluetooth
specifications define a protocol called Bluetooth Network Encapsulation
(BNEP). BNEP is used by the Personal Area Networking (PAN) profiles.
The PAN profiles cover two basic modes of networking. The first profile is a
network access point (NAP). NAPs provide network access in the same way
that an access point for a Wi-Fi network does. They are typically connected
to a wider network and provide bridging. Figure 7-6 shows the structure of a
NAP network. Clients connect using a profile called PAN user (PANU).
The second PAN profile is a group ad-hoc network (GN). GNs are not
intended to provide access to any further network but can be used to create
ad-hoc networks among a group of devices. Figure 7-7 shows the structure
of a GN.
Page view 34
1 2 ... 30 31 32 33 34 35 36 37 38 39 40 ... 45 46

Comments to this Manuals

No comments