Monday, February 7, 2011
】 【Weak current college teaches you the top ten strategies to prevent hacking wireless networks.
1. correct placement network access point devices
Starting from the basis: in the network configuration, to ensure that the wireless access point in the firewall.
2. use MAC prevent hacker attacks
Use ACLs based on MAC addresses (access control lists) to ensure that only through a registered device to enter the network. MAC filtering technology is like the system's front door with a lock, obstacles more will enable the hacker to discourage, had to go and seek other low security network.
3. effective management of wireless network ID
All wireless LAN has a default SSID (service identifier) or network name. Immediately change the name, use the text and symbols to represent numbers. If the enterprise network management capabilities, you should periodically change the SSID. Do not use this name everywhere: i.e. cancel AutoPlay function SSID.
The importance of 4.WEP Protocol
WEP is an 802 .11b wireless LAN standard network security protocols. When the transmission of information through encryption, WEP wireless transmission of data to provide similar protection of cable transmission. In the simple installation and startup, you should immediately change the WEP key by default. The ideal way is WEP password? can be dynamically after the user logs on, so that the hacker changed to wireless network data you need to keep track of these changes. Based on the session and user management of WEP MI? can achieve optimal protection technology, to increase another layer of the network.
5.WEP agreement is not a panacea
Cannot add encryption to protect all their hopes on the WEP Protocol. WEP is a multi-tiered network security measures in a layer, although this technology in data encryption has a very important role, but the overall network security shouldn't rely only on this layer of security. But many network administrators are difficult to accept that view.
6.VPN is the best one of the network security technology
If each of these security measures are hacker enters the network, such as the front door lock SSID changes, MAC address filtering and dynamic change of WEP MI?, then the virtual networks (VPN) is to protect the security of critical network backdoor. VPN with than WEP protocol higher network security (third floor), to support users and network end-to-end secure tunneling.
7. improve existing RADIUS service
Large companies often remote users through the RADIUS (remote users dial authentication services) realization of network authentication login. Corporate it network administrator to add a wireless LAN integration into already existing within the framework of the RADIUS to simplify user management. This will not only be able to implement wireless networking certification, but also to ensure that the wireless user and remote users to use the same authentication method and account number.
8. simplify network security management: the integrated wireless and wired network security policy
Wireless network security is not a separate network architecture, it needs a variety of different programs and protocols. Develop integrated wired and wireless network security policy to improve the level of management, reducing management costs. For example, whether the user is through wired or wireless access network, are integrated in a single user ID and password.
9.WLAN devices are not alike
Although 802 .11b is a standard protocol, all access to WiFi logo certified devices can perform basic functions of communication, but not all the wireless devices are completely equivalent. Although WiFi certification ensures interoperability between devices, but many producers of equipment not including enhanced network security features.
10. not allow non-professionals to build wireless networks
Although the construction of wireless local area network now has a convenient, non-professionals in their own offices to install wireless router and access point devices, however, they installed process rarely take into account the security of the network, as long as network sniffing tools scan network would be able to leave a backdoor attacks by hackers. Thus, in the absence of professional system administrators agree and participation, to limit the construction of a wireless network, so as to guarantee the security of wireless networks.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment