Sunday, July 26, 2009

10 Wireless Network Security

Saturated LAN cable to see the hapless cross? Wireless LAN solution. Wireless network that promises several advantages, including convenience and kerapihan, settings that are easy, and the high mobility of course. But there is vital to remember that, namely security and privacy of the network.

A wireless network can emit a signal until a sufficient distance away from the source. Berkelilinglah or sitting around the office with an antenna that has a power good catch, and a hacking software standards. Result, the flow of data from various wireless network tersadap very easy.

Some of the "moment" following the security of the fort can help your wireless network.

1. Limit the scope of emission or AP
Most of the AP (access points) has a feature to set / adjust the signal strength or even set the direction of the signal. Before using this feature, location Arrange AP may be far from the walls and windows of buildings terluar / your office. After that, set the signal strength so that it does not exceed pancarannya wall terluar. It is what? Of course not, because of the sensitive tapper can still catch the signal, even though the distance is far enough from the AP. Now what? Make the next moment.

2. Lock each AP
AP entire network is locked so you must not have the right people can not work atiknya. How do I lock it? Use the administrator password on each AP. The important thing, do not use the default password, create your own password.

3. Cegahlah connection from the AP is not entitled
If an AP is connected to the house or your office network, make sure the AP is correct and eligible. Section, if the AP was not part of the network, will certainly jeopardize your network. Download NetStumbler-lah (www.netstumbler.com). This free software can help you prevent AP connections that are not eligible.

4. Use WEP encryption 128-bit
With the wired equivalent privacy (WEP), infiltration into your wireless network will be "slightly" more secure. But this is not enough. Because only with free software based on Linux, a powerful hacker can still penetrate to the network using WEP. But at least this way can prevent intruders amateur.

5. Use carefully SSIDs
Change the default Service Set Identifiers (SSIDs) in the AP, and do not show clear information, such as address or name of the company. We recommend you purchase the AP has a feature to disable the SSID. Unfortunately, it can use a program such as Kismet (www.kismetwireless.net) to tap SSID. Examine how the frame manager 802.11x occur when users connect to the AP.

6. Restrict access
Not all people in the building or office you need a wireless network card, is not it? When you have anyone who can connect, so that accessibility to Arrange AP (via the wireless card) only for the MAC address (Medium Access Control) only. But a person can make a false MAC AP to deceive you. So this moment is also less.

7. Limit the number of IP addresses
If the number of users you do not have many, batasilah the maximum number of addresses in the DHCP (Dynamic Host Configuration Protocol) network that can ditampung. So when there are people in the office who try to join but can not, it means the person is not entitled.

8. User authentication
Use a firewall that can connect VPN (Virtual Private Network), which requires users to perform authentication (log on) first. Linksys BEFSX41 router can do this. You can set the permission to connect only to things that are needed.

VPN users can prevent it by a misguided attempt entry. It will create a machine that pretend to be eligible for the AP you are connecting. Then he will have to wait until someone is deceived, and do authentication. Nah, it's here will be visible to use a VPN. If you connect to an AP, but get a log on prompt for one of the VPN connection, that means you have to connect to the AP that one (not eligible).

9. Use Radius
Set Radius server authentication method that provides a complement to the previous moment. Thus the authentication process is done you will be layered and difficult to be penetrated. But the price is quite expensive server. So what if you do not have a budget? Do not be discouraged, try free software like FreeRADIUS (www.freeradius.org).

10. Use the "watchdog"
You have invaluable data that price? For example, the "secret formula modifier iron into gold." If so, should you need further consolidate the security of your network. How? In addition to implementing some of the moment, the use of sophisticated security equipment. Try AirDefense (www.airdefense.com), equipment such as servers that use a sensor placed near and AP. This tool will monitor all activities and protect your wireless network. Unfortunately the price is very expensive equipment, about 10,000 to 100,000 U.S. dollars. Therefore, use this tool if your data is only valuable billions U.S. dollars. (KK / CTR)

No comments:

Post a Comment

semarang jawa tengah indonesia service keyboard service computer komputer kendal bali setting hotspot hacking password mysql protected username jasa setting jual beli
bobol password phpmyadmin debian 5 lenny ubuntu server surabaya sumatera american inggris access point microtic MikroTik jawa barat yamaha roland casio korg technic floppy disk emulator usb www universal cara ganti broadcast editing wireless Wi-Fi handphone novel health facebook Sepeda Fixie Jual Beli Sepeda Fixie Rose Network Sepeda Fixie Murah Wimax Wimax Indonesia, Long time waktu lorong waktu facebook twitter

Followers