Tuesday, November 2, 2010

How to Secure a Wireless Network in Home or in the Office  

Wireless networking offers some repayment that are obvious - no wires and the most obvious is portability to allow you to surf the Internet by your pool side, your fireplace, or anywhere else in your house. Or you can play online game wirelessly with your XBOX console in the comfort of the living room without the clutter of the wires. Like the "wired LAN", wireless agreement is also vulnerable to any types of security threats such as Denial of Services (DoS); Spamming; spoofing; Sniffers. The question is how to reliable a wireless network? Security might be the last thing on your mind when setting up a wireless network. As a all-purpose rule, you must use a level of security that corresponds to the sensitivity of the data on your network. Unlike wired systems, which can be physically secured, wireless networks are not confined to the inside of buildings. They can be selected up as far as 1,000 feet outside of the premises with a laptop and a hi-gain directional antenna.

Wireless security is inherently simpler to crack than wired networks in view of the fact that there's no need for a corporal connection to your network. Data conveying occurs over the airwaves, and that makes accessing it easier. Therefore, a systematic deal with in securing a wireless agreement is absolutely a must including: 1. Securing the wireless connection against unauthorized users within the agreement coverage 2. Securing the end point of the agreement facing the internet.

Securing a wireless connection There are link of techniques you can use to reliable a wireless connection, wireless encryption and MAC take up filter. The first generation of wireless connection security is WEP - Wireless Equivalent Privacy which was intended to grant confidentiality akin to that of a traditional wired network. WEP is the wireless security which is embedded to frequently the 802.11b and g standards. Unfortunately the researchers had establish numerous weaknesses in this WEP system. The latest industrial wireless security is Wi-Fi Protected Access (WPA and WPA2) which is a certification program made by the Wi-Fi Alliance to indicate compliance with the security protocol made by the Wi-Fi Alliance.

How to reliable a wireless agreement using WPA/WPA2? Firstly you must exceptional the wireless devices that support WPA/WPA2 encryption such as WRT610N wireless router by Linksys or NETGEAR WNDR3700 Rangemax router. In Windows platform, there are two options you can configure when you are using WPA/WPA2 encryption: using Windows Connect Now and blue-collar configuration.

If your wireless router doesn't support WCN (Windows Connect Now), then you need to manually configure the router. Logon to the router via your web browser by accessing the default router address, and locate the router's configuration page. Consult with the blue-collar book that comes with the router. If your router chains Windows Connect Now, you can quickly and straightforwardly configure the router by following the instructions in Using Windows Connect Now technology. If you are using WPA, permanently remember that each device in your wireless agreement MUST use the same WPA mode and mutual key, or else the agreement will not function properly.

MAC Address Filter Wireless door can be filtered by using the MAC addresses of the wireless devices transmitting within your network's radius. Select Enabled/Disabled the Wireless MAC filter in the router's configuration page, default setting is disabled. You must make possible the setting to configure the wireless MAC filter either prevent or card access. You must know the MAC addresses of the wireless device to be included in the card or prevent MAC take up record. The MAC take up on wireless agreement adapters is typically in black and white on the agreement adapter's underside. But if your Wi-Fi adapters (PCI wireless adapters) have been installed in the desktop PCI slot, you cannot recognize the corporal take up visually. In a mandate line suitable (press Windows + R keys at once and type in CMD and press enter) type ipconfig /all mandate and you can find the device corporal address.

Change the default wireless agreement name or SSID Wireless devices have a default wireless agreement name or Service Set Identifier (SSID) set by the factory. This is the name of your wireless network, and can be up to 32 characters in length. Each wireless manufactured goods has their own default SSID as the default wireless agreement name. You must change the wireless agreement name to a touch unique to distinguish your wireless agreement from additional wireless networks that may exist around you, but do not use personal information in view of the fact that this information may be available for anyone to see when browsing for wireless networks.

Change the default password Wireless routers / AP have a default username and password set by the factory. Mostly their default username is admin or some have their default password as password. Hackers know these defaults and may try to use them to door your wireless device and change your agreement settings. To place a stop to any unauthorized changes, customize the device's password so it will be hard to guess.

Securing the end point of the agreement facing the internet How to reliable a wireless agreement from any types of internet threats? It depends on the wireless routers security features, but typically all the wireless routers support dual-firewall features: NAT and SPI which is enabled by default. NAT (Network take up translation) helps you to hide the confidential agreement from the public agreement (the internet), and the (SPI) stateful carton inspection will inspect the incoming packets thoroughly for any fake obvious packets.

For a complete article, delight visit: How to reliable a wireless agreement and how to troubleshoot a wireless agreement



Ki Grinsing was graduated from ITS Surabaya with the additions of MCSE and CCNA certifications. He has long years of working experience in IT

No comments:

Post a Comment