WLAN security checklist
Disable 802.1x function
This function, often called automatic key distribution, supplies the computers of a network with a WEP key. This function presents a potential opportunity to attack and is designed for small and home networks expendable.
Change SSID and SSID broadcast off
Change the default SSID. The SSID (Service Set Identifier) is the name of a radio network, which is based on IEEE 802.11 and can take up to 32 characters long. The SSID is all unencrypted packets in question. The name of the wireless network should be no evidence of location or operator of the devices still contain conclusions on the device of the access points allow.
By activating the Hide SSID is the name of the transmitter (access point) is no longer active broadcast. If you disable this setting, then you must be in the Wi-Fi clients, dealing with the access point to connect the name of the network manually. When you enter manually on the exact spelling of the name (uppercase and lowercase letters is relevant).
MAC filtering on
The MAC address (Media Access Control) are provided by the manufacturer, usually unchangeable identification number of network cards. By entering the MAC addresses of your network cards and WLAN cards restrict access to the AP on this circle. The MACs are, however, attackers from eavesdropping and data to filter out abuse for their own purposes (spoofing).
Prevent Remote Access
Many APs are factory for remote access released. Together with a default password, this is almost an invitation to all hackers. Uncheck if you do not qualify for special care of your APs via the Internet require remote access (remote mangagement "or" management from internet ") and the Remote Update feature.
Backup your settings
Make a backup of your changes. Save this file on your hard drive, but on an external disk. This makes them by spying trojan programs. Write down the changes and access to, or print it out, they are used to configure the clients need.
important protective measures
- Go regularly to the encryption keys used.
- Optimize installation, antenna orientation and, where appropriate, the transmission power of access points to radiation in unwanted directions to prevent.
- Disable the access point when not in use.
- Use additional protection of the APs and set it as a firewall.
- Check the log files regularly to unknown MAC addresses, in order to detect possible intrusions.
- Replace your Access Point against a newer model, with encryption for the WPA or IEEE 802.11i standard (WPA2) from.
Bookmarks