SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
SMC Networks
8 Ways of adding security to your wireless
network
1        Disable the Network Name (SSID)

To make it easy for wireless receivers to find their transmitter, most
wireless devices are configured by default to broadcast a beacon known as a
Service Set Identifier (SSID).

This SSID or network name can be changed to a private name and can also
be hidden (not broadcasted). This way, only receivers that know the correct
SSID will be able to connect to the wireless network.
2        MAC Address Filtering

As a form of physical security, it is possible from the router to only allow
specified networks users to access the wireless network by identifying their
unique Ethernet MAC address associated with each network device. This
gives a level of security similar to staff access cards and identification
badges.
3        WEP/WPA/WPA2

These abbreviations refer to three different encryption standards that can
   be used to secure a wireless network:

a) Wired Equivalent Privacy (WEP) is not considered secure anymore and
   should only be used with legacy equipment that does not support
   WPA/WPA2.

b) WiFi Protected Access (WPA) offers a higher level of wireless security,
   making sure that the data will remain private and access to the network
   is restricted to authorized users.

c) WPA2 has replaced WPA and uses a stronger encryption standard called
   Advanced Encryption Standard (AES).
4        IEEE802.1x

The IEEE802.1x standard describes how to provide authentication and
   authorization using an authentication server that keeps usernames,
   passwords and user rights to access a network in a central database.

This way, a wireless router/ access point will contact the authentication
   server first when a device wants to connect to the wireless network. The
   server checks the user credentials against the database and informs the
   wireless router/ access point if the relevant user is allowed to access the
   network or not, and what are the relevant user rights.
5        Disable DHCP Server

Disabling the DHCP Server of a wireless router will stop it from
   automatically assigning IP addresses to new devices, including potential
   hackers. Instead, the network administrator has to configure new
   devices manually with valid IP address information.
6        IP Subnetting
IP addresses and subnets in home wireless networks are normally
    configured so that 254 users can have a valid IP address. For example:

Router IP: 192.168.2.1
Computer IPs: 192.168.2.2 to 192.168.2.254
Subnet Mask: 255.255.255.0

For additional security, the router could also be configured with a subnet
   that allows to assign 6 IP addresses only. For instance:

Router IP: 192.168.2.1
Computer IP: 192.168.2.2 to 192.168.2.6
Subnet: 255.255.255.248

This way the maximum number of devices in the LAN is limited and external
   customer will need to know the subnet used in the network to be able to
   connect.
7        User name & password of router admin


After being connected wireless or wired to the network, the admin interface
   of the router can normally be accessed by entering its IP address in a
   web browser. With the help of a username and a password, all router
   settings can be changed.

In order to avoid an intruder to be able to login to the network router and
    make configuration changes in the network, it is recommended to
    change the username (if possible) and the password of the router admin
    web interface.
8        Change default IP address range

The wireless routers normally are by default configured with an IP address
   like this

192.168.x.x (for SMC Networks Routers 192.168.2.1)

If you are thinking in disabling the DHCP server so that the router will not
    assign IP addresses to devices, you might want as well to change the
    range of the IP addresses used in your whole network. For example:

10.0.x.x
Router: 10.0.0.1
Other devices: 10.0.0.2-254

This way, possible intruders will not know the IP address range and it will be
   more difficult for them to get connected.
For more technical documents visit us
www.smc.com
Disclaimer: All data has been carefully checked for correctness.
SMC Networks takes no responsibility for possible errors in this document.
All technical specifications are subject to change without prior notice.

(c) 2010, SMC Networks

Weitere ähnliche Inhalte

Was ist angesagt?

Simple IPv4_Subnetting
Simple IPv4_SubnettingSimple IPv4_Subnetting
Simple IPv4_SubnettingUmer Qureshi
 
How to setup a wireless network router
How to setup a wireless network routerHow to setup a wireless network router
How to setup a wireless network routerAnthonysshareslide
 
Manual wireless router cnet cwr 854
Manual wireless router cnet cwr 854Manual wireless router cnet cwr 854
Manual wireless router cnet cwr 854fgonzalez2005
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Configure router for wap (wireless access point
Configure router for wap (wireless access pointConfigure router for wap (wireless access point
Configure router for wap (wireless access pointsergio goco
 
D link router_setup_example
D link router_setup_exampleD link router_setup_example
D link router_setup_example97148881557
 
Types of interfaces in a Cisco Router
Types of interfaces in a Cisco RouterTypes of interfaces in a Cisco Router
Types of interfaces in a Cisco RouterNetProtocol Xpert
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpnjadeja dhanraj
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersNetProtocol Xpert
 
Man connaction
Man connactionMan connaction
Man connactionArjun Das
 
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...SaNju MuLak
 
TLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless RouterTLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless RouterRomne Ryan Portacion
 
Access list-cheatsheet
Access list-cheatsheetAccess list-cheatsheet
Access list-cheatsheetvannastart
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Dân Chơi
 

Was ist angesagt? (20)

How to make a simple application on packet tracer
How to make a simple application on packet tracerHow to make a simple application on packet tracer
How to make a simple application on packet tracer
 
Ccna ppt
Ccna pptCcna ppt
Ccna ppt
 
Simple IPv4_Subnetting
Simple IPv4_SubnettingSimple IPv4_Subnetting
Simple IPv4_Subnetting
 
CCNA Icnd110 s04l02
CCNA Icnd110 s04l02CCNA Icnd110 s04l02
CCNA Icnd110 s04l02
 
How to setup a wireless network router
How to setup a wireless network routerHow to setup a wireless network router
How to setup a wireless network router
 
An Insight on Industrial 4G Routers
An Insight on Industrial 4G RoutersAn Insight on Industrial 4G Routers
An Insight on Industrial 4G Routers
 
Manual wireless router cnet cwr 854
Manual wireless router cnet cwr 854Manual wireless router cnet cwr 854
Manual wireless router cnet cwr 854
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Configure router for wap (wireless access point
Configure router for wap (wireless access pointConfigure router for wap (wireless access point
Configure router for wap (wireless access point
 
D link router_setup_example
D link router_setup_exampleD link router_setup_example
D link router_setup_example
 
Types of interfaces in a Cisco Router
Types of interfaces in a Cisco RouterTypes of interfaces in a Cisco Router
Types of interfaces in a Cisco Router
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & Answers
 
Man connaction
Man connactionMan connaction
Man connaction
 
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...
 
TLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless RouterTLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless Router
 
Access list-cheatsheet
Access list-cheatsheetAccess list-cheatsheet
Access list-cheatsheet
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011
 

Andere mochten auch

3Rs Explosives Safety Education Program Outreach Toolbox
3Rs Explosives Safety Education Program Outreach Toolbox3Rs Explosives Safety Education Program Outreach Toolbox
3Rs Explosives Safety Education Program Outreach ToolboxGeoffrey Carton
 
New Apec
New ApecNew Apec
New ApecMitsJr
 
2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…
2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…
2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…Geoffrey Carton
 
Characterization Of Explosives Contamination at Munitions Manufacturing Facil...
Characterization Of Explosives Contamination at Munitions Manufacturing Facil...Characterization Of Explosives Contamination at Munitions Manufacturing Facil...
Characterization Of Explosives Contamination at Munitions Manufacturing Facil...Geoffrey Carton
 
Sundrell
SundrellSundrell
SundrellMitsJr
 
2013 Ordnance Reef HI - webinar- wo prelim results
2013 Ordnance Reef HI - webinar- wo prelim results2013 Ordnance Reef HI - webinar- wo prelim results
2013 Ordnance Reef HI - webinar- wo prelim resultsGeoffrey Carton
 
2009 Historic Disposal of Military Munitions in US Coastal Waters
2009 Historic Disposal of Military Munitions in US Coastal Waters2009 Historic Disposal of Military Munitions in US Coastal Waters
2009 Historic Disposal of Military Munitions in US Coastal WatersGeoffrey Carton
 
Presentation power point2.
Presentation power point2.Presentation power point2.
Presentation power point2.Gerard Remo
 

Andere mochten auch (9)

3Rs Explosives Safety Education Program Outreach Toolbox
3Rs Explosives Safety Education Program Outreach Toolbox3Rs Explosives Safety Education Program Outreach Toolbox
3Rs Explosives Safety Education Program Outreach Toolbox
 
New Apec
New ApecNew Apec
New Apec
 
Lan speeds
Lan speedsLan speeds
Lan speeds
 
2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…
2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…
2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…
 
Characterization Of Explosives Contamination at Munitions Manufacturing Facil...
Characterization Of Explosives Contamination at Munitions Manufacturing Facil...Characterization Of Explosives Contamination at Munitions Manufacturing Facil...
Characterization Of Explosives Contamination at Munitions Manufacturing Facil...
 
Sundrell
SundrellSundrell
Sundrell
 
2013 Ordnance Reef HI - webinar- wo prelim results
2013 Ordnance Reef HI - webinar- wo prelim results2013 Ordnance Reef HI - webinar- wo prelim results
2013 Ordnance Reef HI - webinar- wo prelim results
 
2009 Historic Disposal of Military Munitions in US Coastal Waters
2009 Historic Disposal of Military Munitions in US Coastal Waters2009 Historic Disposal of Military Munitions in US Coastal Waters
2009 Historic Disposal of Military Munitions in US Coastal Waters
 
Presentation power point2.
Presentation power point2.Presentation power point2.
Presentation power point2.
 

Ähnlich wie 8 ways security_wireless

Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Securing home wifi 16 mar15
Securing home wifi 16 mar15Securing home wifi 16 mar15
Securing home wifi 16 mar15Naval OPSEC
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiAgreeta Sharma
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - EnglishAdhie Lesmana
 
Wireless networks 07
Wireless networks 07Wireless networks 07
Wireless networks 07Roohul Amin
 
Cognex In-Sight - Network Settings.pdf
Cognex In-Sight - Network Settings.pdfCognex In-Sight - Network Settings.pdf
Cognex In-Sight - Network Settings.pdfDiogoCampezatto
 
Networking Related
Networking RelatedNetworking Related
Networking RelatedZunAib Ali
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyahSeptafiansyah P
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalFisal Anwari
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsYaser Rahmati
 
All about routers
All about routersAll about routers
All about routersagwanna
 
Northridge Consulting Group Case Project
Northridge Consulting Group Case ProjectNorthridge Consulting Group Case Project
Northridge Consulting Group Case Projectedwardlong
 

Ähnlich wie 8 ways security_wireless (20)

Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
Securing home wifi 16 mar15
Securing home wifi 16 mar15Securing home wifi 16 mar15
Securing home wifi 16 mar15
 
5 steps
5 steps5 steps
5 steps
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi Fi
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
 
Dasar komputer chapter8
Dasar komputer chapter8Dasar komputer chapter8
Dasar komputer chapter8
 
Wireless Router: This is how it Benefits
Wireless Router: This is how it BenefitsWireless Router: This is how it Benefits
Wireless Router: This is how it Benefits
 
Wireless networks 07
Wireless networks 07Wireless networks 07
Wireless networks 07
 
Cognex In-Sight - Network Settings.pdf
Cognex In-Sight - Network Settings.pdfCognex In-Sight - Network Settings.pdf
Cognex In-Sight - Network Settings.pdf
 
Networking Related
Networking RelatedNetworking Related
Networking Related
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyah
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
net work iTM3
net work iTM3net work iTM3
net work iTM3
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
Network
NetworkNetwork
Network
 
All about routers
All about routersAll about routers
All about routers
 
Northridge Consulting Group Case Project
Northridge Consulting Group Case ProjectNorthridge Consulting Group Case Project
Northridge Consulting Group Case Project
 

Kürzlich hochgeladen

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Kürzlich hochgeladen (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

8 ways security_wireless

  • 1. SMC Networks 8 Ways of adding security to your wireless network
  • 2. 1 Disable the Network Name (SSID) To make it easy for wireless receivers to find their transmitter, most wireless devices are configured by default to broadcast a beacon known as a Service Set Identifier (SSID). This SSID or network name can be changed to a private name and can also be hidden (not broadcasted). This way, only receivers that know the correct SSID will be able to connect to the wireless network.
  • 3. 2 MAC Address Filtering As a form of physical security, it is possible from the router to only allow specified networks users to access the wireless network by identifying their unique Ethernet MAC address associated with each network device. This gives a level of security similar to staff access cards and identification badges.
  • 4. 3 WEP/WPA/WPA2 These abbreviations refer to three different encryption standards that can be used to secure a wireless network: a) Wired Equivalent Privacy (WEP) is not considered secure anymore and should only be used with legacy equipment that does not support WPA/WPA2. b) WiFi Protected Access (WPA) offers a higher level of wireless security, making sure that the data will remain private and access to the network is restricted to authorized users. c) WPA2 has replaced WPA and uses a stronger encryption standard called Advanced Encryption Standard (AES).
  • 5. 4 IEEE802.1x The IEEE802.1x standard describes how to provide authentication and authorization using an authentication server that keeps usernames, passwords and user rights to access a network in a central database. This way, a wireless router/ access point will contact the authentication server first when a device wants to connect to the wireless network. The server checks the user credentials against the database and informs the wireless router/ access point if the relevant user is allowed to access the network or not, and what are the relevant user rights.
  • 6. 5 Disable DHCP Server Disabling the DHCP Server of a wireless router will stop it from automatically assigning IP addresses to new devices, including potential hackers. Instead, the network administrator has to configure new devices manually with valid IP address information.
  • 7. 6 IP Subnetting IP addresses and subnets in home wireless networks are normally configured so that 254 users can have a valid IP address. For example: Router IP: 192.168.2.1 Computer IPs: 192.168.2.2 to 192.168.2.254 Subnet Mask: 255.255.255.0 For additional security, the router could also be configured with a subnet that allows to assign 6 IP addresses only. For instance: Router IP: 192.168.2.1 Computer IP: 192.168.2.2 to 192.168.2.6 Subnet: 255.255.255.248 This way the maximum number of devices in the LAN is limited and external customer will need to know the subnet used in the network to be able to connect.
  • 8. 7 User name & password of router admin After being connected wireless or wired to the network, the admin interface of the router can normally be accessed by entering its IP address in a web browser. With the help of a username and a password, all router settings can be changed. In order to avoid an intruder to be able to login to the network router and make configuration changes in the network, it is recommended to change the username (if possible) and the password of the router admin web interface.
  • 9. 8 Change default IP address range The wireless routers normally are by default configured with an IP address like this 192.168.x.x (for SMC Networks Routers 192.168.2.1) If you are thinking in disabling the DHCP server so that the router will not assign IP addresses to devices, you might want as well to change the range of the IP addresses used in your whole network. For example: 10.0.x.x Router: 10.0.0.1 Other devices: 10.0.0.2-254 This way, possible intruders will not know the IP address range and it will be more difficult for them to get connected.
  • 10. For more technical documents visit us www.smc.com Disclaimer: All data has been carefully checked for correctness. SMC Networks takes no responsibility for possible errors in this document. All technical specifications are subject to change without prior notice. (c) 2010, SMC Networks