Monday, December 27, 2010
【 Weak current College 】 unveil the hidden risks of wireless network
In planning a wireless network installation, be sure to carefully assess and address the risks. Otherwise, some unforeseen problems, such as radio frequency interference, poor performance, and security vulnerabilities and other problems will cause serious damage. By addressing the wireless network deployment in the early stages of the risk, you will greatly increase the chances of success of the wireless network.
Here is what you need to consider are the common risks:
Requirements not clearly
If you do not first of all to clarify the requirements on the deployment of wireless networks, the wireless network may not be able to meet the needs of users. In fact, does not sound even problematic needs often information system project was unsuccessful. Therefore, in depth before deployment, it is important to define clear needs.
For example, you can install 802.11g network today to support a moderate number of users to access e-mail and browse the Web. But in 10 months later, your organization can increase the number of users, or need to use multimedia applications, this requires more performance solution. So, your organization has faced migration to 802 .11n. Therefore, immediately begin to seriously consider your needs, from choosing the right technology.
Radio frequency interference
Some devices, such as 2.4GHz and 5GHz of cordless phones, microwave ovens and neighboring wireless networks can be devastating for radio frequency interference, reduce wireless network performance. In order to minimize the risk of radio-frequency interference, the unit should be on your wireless network location to investigate and found that there may be interference, and before you install an access point AP to define the action.
RF interference with this problem are not always controlled. For example, you can deploy in an Office one 2.4GHz 802 .11n wireless networking, however, three months later, in your company's next door, another company will be the same wireless network installed into the same channel. This leads to a conflict between the two networks. To reduce the risk of one way is to use directional antenna, make sure that your wireless network to send and receive only within the scope of facilities. This will limit the interference between wireless network. You can also specify a 5 GHz 802 .11n, which is how to select the do not conflict with other network channel will provide better flexibility.
Security weaknesses
If an unauthorized person may access enterprise information, this will be a major threat to wireless networks. Eavesdroppers can be free to use such as Wireshark, wireless network analysis tool to receive and view the contents of a data frame 802.11. You can imagine, this risk is likely to reveal credit card numbers, passwords and other sensitive information.
You should carefully assess the vulnerability of the wireless network so as to avoid the risk, then you need to protect the information of value to define an effective security policy. In some cases, you may only need a firewall. Other applications might need an effective form of encryption, 802.1x port-based authentication also will provide more security.
Application program interface
In some cases, when using a wireless network, located in a variety of host and server application interface can cause serious problems. As RF interference or coverage too small caused by network connectivity loss will cause some temporary application generates an error. Especially in some older applications on wireless systems lack error recovery mechanism, this problem occurs.
To avoid this risk, you need to carefully define the wireless user devices will use its associated interface application type. If necessary, may wish to consider using a wireless middleware (e.g. NetMotion) and other programmes to provide wireless network for full recovery mechanisms.
By identifying and addressing the potential risks to your wireless network deployment will be more successful. However, you should also be combined with your own business, further analysis and definition of risk wireless LAN.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment