How to Secure a Wireless Network in Home or in the Office
Computers & Technology → Networking
- Author Ki Grinsing
- Published April 23, 2010
- Word count 902
Wireless networking offers some benefits that are apparent – no wires and the most obvious is portability to allow you to surf the Internet by your pool side, your fireplace, or anywhere else in your house. Or you can play online game wirelessly with your XBOX console in the comfort of the living room without the clutter of the wires. Like the "wired LAN", wireless network is also vulnerable to any types of security threats such as Denial of Services (DoS); Spamming; spoofing; Sniffers. The question is how to secure a wireless network?
Security might be the last thing on your mind when setting up a wireless network. As a general rule, you should employ a level of security that corresponds to the sensitivity of the data on your network. Unlike wired systems, which can be physically secured, wireless networks are not confined to the inside of buildings. They can be picked up as far as 1,000 feet outside of the premises with a laptop and a hi-gain directional antenna.
Wireless security is inherently easier to crack than wired networks because there's no need for a physical connection to your network. Data transfer occurs over the airwaves, and that makes accessing it easier. Therefore, a systematic approach in securing a wireless network is absolutely a must including:
-
Securing the wireless connection against unauthorized users within the network coverage
-
Securing the end point of the network facing the internet.
Securing a wireless connection
There are couple of techniques you can use to secure a wireless connection, wireless encryption and MAC address filter. The first generation of wireless connection security is WEP – Wireless Equivalent Privacy which was intended to provide confidentiality comparable to that of a traditional wired network. WEP is the wireless security which is embedded to mostly the 802.11b and g standards. Unfortunately the researchers had found several weaknesses in this WEP system.
The latest industrial wireless security is Wi-Fi Protected Access (WPA and WPA2) which is a certification program created by the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi Alliance.
How to secure a wireless network using WPA/WPA2? Firstly you should select the wireless devices that support WPA/WPA2 encryption such as WRT610N wireless router by Linksys or NETGEAR WNDR3700 Rangemax router. In Windows platform, there are two options you can configure when you are using WPA/WPA2 encryption: using Windows Connect Now and manual configuration.
If your wireless router doesn’t support WCN (Windows Connect Now), then you need to manually configure the router. Logon to the router via your web browser by accessing the default router address, and locate the router’s configuration page. Consult with the manual book that comes with the router. If your router supports Windows Connect Now, you can quickly and easily configure the router by following the instructions in Using Windows Connect Now technology.
If you are using WPA, always remember that each device in your wireless network MUST use the same WPA method and shared key, or else the network will not function properly.
MAC Address Filter
Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius. Select Enabled/Disabled the Wireless MAC filter in the router’s configuration page, default setting is disabled. You should enable the setting to configure the wireless MAC filter either prevent or permit access. You should know the MAC addresses of the wireless device to be included in the permit or prevent MAC address record. The MAC address on wireless network adapters is typically printed on the network adapter's underside.
But if your Wi-Fi adapters (PCI wireless adapters) have been installed in the desktop PCI slot, you cannot recognize the physical address visually. In a command line prompt (press Windows + R keys simultaneously and type in CMD and press enter) type ipconfig /all command and you can find the device physical address.
Change the default wireless network name or SSID
Wireless devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. This is the name of your wireless network, and can be up to 32 characters in length. Each wireless product has their own default SSID as the default wireless network name. You should change the wireless network name to something unique to distinguish your wireless network from other wireless networks that may exist around you, but do not use personal information because this information may be available for anyone to see when browsing for wireless networks.
Change the default password
Wireless routers / AP have a default username and password set by the factory. Mostly their default username is admin or some have their default password as password. Hackers know these defaults and may try to use them to access your wireless device and change your network settings. To thwart any unauthorized changes, customize the device’s password so it will be hard to guess.
Securing the end point of the network facing the internet
How to secure a wireless network from any types of internet threats? It depends on the wireless routers security features, but typically all the wireless routers support dual-firewall features: NAT and SPI which is enabled by default. NAT (Network address translation) helps you to hide the private network from the public network (the internet), and the (SPI) stateful packet inspection will examine the incoming packets thoroughly for any false positive packets.
Ki Grinsing was graduated from ITS Surabaya with the additions of MCSE and CCNA certifications. He has long years of working experience in IT. For a complete article, please visit: How to secure a wireless network and how to troubleshoot a wireless network
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- Optimize Your Website for the Better Sight
- How To Develop & Implement A Network Security Plan
- Mastering VoIP: Overcoming Common Communication Challenges
- What Concerns Do Enterprises Have When Choosing Network Monitoring Software?
- Spectrum Router Red Light: Troubleshooting Guide and Solutions
- Web Development Made Easy: Why Outsourcing is the Smart Choice
- INTERNET OF THINGS
- Enhancing Business Communication with 3CX: A Powerful Unified Communications Solution
- How to Fix "No Signal, Please Check Your Antenna Connection" Error
- AN INTRODUCTION TO INTERNET MARKETING
- Passwordless is the New Cyber Security, Emir Ceric’s Meveto Transform Verification, Logging In and Remote Sign Out
- The Ultimate Guide to Master YouTube and Monetization
- Preventing data theft in an enterprise environment
- The Art Of Cold Calling [Mastery In Seven Simple Steps]
- Quantum Computing and the future of IT Security
- 5G TECHNOLOGY AND IOT: HOW DO THESE TRENDS RELATE?
- SkyVPN Launches New Gaming Servers with Dedicated Servers for PUBG
- Smm reseller panel
- Steps to Transfer Files Using Kindle Desktop Application
- Save time on your FTP updates with FTPGetter Professional
- Add a file hosting and sharing service to your site with YetiShare
- MCS Multicast Switch for Next Generation ROADM
- Business Networking Tips for Beginners
- Using Virtual Serial Ports in Proteus
- Network Security Checklist for All Types of Businesses
- Create Your Own File-Hosting Website with YetiShare
- Cat5 cable vs Cat6 Cables: What are the Contrast?
- Automate FTP Downloads and Uploads with FTPGetter Professional
- On Demand Freelance Marketplace For Field Engineers
- Cisco Network Infrastructure Services in San Francisco