Results 1 to 4 of 4

Thread: Securing wireless connections - WLAN WAP

  1. #1
    Join Date
    Jan 2011

    Securing wireless connections - WLAN WAP

    The just thing you necessitate to know regarding wireless security is that you cannot perimeter-ize it. Wireless technologies are not rather that stop at any customary network boundary, so you cannot think your security efforts for wireless at the boundaries.

    In its place, you have to spread your security nets wide. You have to think and defend each device with a wireless network card: each wireless access point, each computer, every handheld, each bit that travels your network bandwidth, and all over they go. You have to do this, in case others attack them and, weak, they become a playground for cruel marauders, free and open conduits right into your interior network, which after that becomes a vast information money trove for your competition. To assist you, I have set a list of best practices for every of these in part two (see below); but foremost, a bit background:

    Wireless security features:

    Two factors decide which wireless security features are current. These things are the network mode and the IEEE standard. While extra add-on applications and devices subsist that can broaden security choices, if you don't comprehend the present limitations of most wireless devices, you won't know which, if any of these, may advantage you.

    Wireless LANs can survive in either ad hoc (peer-to-peer) or communications (all wireless devices have to connect to an access point) form. In ad hoc form, clients communicate straight with every other. Say two of your workers, Alice and Bob, set up their own wireless, ad hoc wireless LAN. Alice cans depiction defenseless applications, shares and other things on her system, to Bob. Unluckily, they're bare to just about anybody else with a wireless card. Congratulations, you just regressed your warily constructed Windows 2000 Active Directory infrastructure to Windows for Workgroups. (It's not tough. XP mechanically and by default will arrange itself to discover and connect to a wireless access point if any subsist and, if none exist, it places itself in ad hoc mode, and so bit cleverness is necessary to set things up.) So where is the security in all this? The response based on which wireless standard are executed in your hardware and software.

    While quite a lot of emerging wireless standards are present, there are three which you are most probable to discover in the present market: 802.11a, 802.11b and 802.1 xs. The oldest is the 802.11b standard and the majority wireless LANs rally it. The next one, 802.11a, is quicker, but you cannot blend and bout 802.11a and 802.11b hardware and software on your wireless LAN. 802.1x is a verification standard for 802.11 wireless LANs, but it needs extra hardware and software for its completion.

    In a Windows 2000 network, you can employ Internet Access Services (IAS) server. It's integral to Windows 2000, but it have to be installed and configured. Windows XP offers a local 802.1x client which can take benefit of this setup. Verification can after that occurs via Extensible Authentication Protocol (EAP). This protocol describes basic authentication procedures common to the majority authentication protocols and permits administrative option of supported add-ons. For Windows 2000 IAS, sustained protocols are EAP-TLS, Protected EAP (PEAP) with EAP-TLS. PEAP is intended to structure for the lacks of EAP, which does not defend user identity and cooperation procedures; EAP as well does not address the trouble of key exchange. TLS editions of this protocol need the use of certificates, when PEAP with EAP-MS-CHAP utilizes passwords.

  2. #2
    Join Date
    May 2009

    Re: Securing wireless connections - WLAN WAP

    This sounds like an intimidating task, but the good news is that you may previously have much of your security in place. Here are the steps to a more protected wireless LAN.

    • Host systems: You have precise security technologies for host protection, and you have to apply them. Unfamiliarity with wireless technologies doesn't denote you want not applies sound security observes to your network, your user community and mainly the host systems themselves. Think untrusted network!

      You wouldn't put Windows clients or servers defenseless on the Internet, so you shouldn't depiction them to a wireless network either. Explicitly, memorize to harden NTFS and registry permissions, not to utilize the FAT file system, to utilize group policy to apply burly account policies for accounts (local account databases exist -- they require sturdy account polices too), to decrease user rights and to situate security alternatives that defend the system. Think using the user access right to the system from the network to set up a group, say the local administrators group which will be the simply group capable to access this PC from the network. If the host is a server, think establishing a group which comprises just those who should be connecting to it. Keep in mind as well, if wireless networks unlock holes to your interior network, it possibly time to execute those host-security lockdown policies for all machines, not only those with wireless network cards.

    • Network defense: Except the wireless LAN is self-contained -- a tiny network in a meeting room lacking Internet connections, for instance -- the AP is connected to a few networks. It serves as a bridge for wireless customers to facilitate their connections to your home wired network. So think of it as just that -- a bridge from "untrusted" to "trusted." It's not that you should right away think all wireless users in your group untrustworthy; it's the surplus connections you wish to avoid. To do so, utilize 802.1x where you can, and install a VPN where you can't. That way, "Ian the interloper" may be capable to make a connection to the AP but will not be bright to access your network, because he cannot give suitable credentials to either the VPN or the RADIUS server.

    • User education: Don't overlook that many of your troubles with wireless security will arrive not from managed APs and locked-down hosts but from rogue APs concealed by users below their desks, or presented by individual departments in conference rooms. You should, obviously, be monitoring for these systems, but user education can stop their completion. Knowledgeable users are your best vanguard defense. If they have an approval for the risks and know how to mitigate them, I think you will discover those willing participants.

  3. #3
    Join Date
    Apr 2008

    Re: Securing wireless connections - WLAN WAP

    Yes it does overflow of physical boundaries, which are not my point. The signal radius can be abridged using pair dissimilar techniques. I am not saying this is where your security should stop; just this is one factor in lots of security you can manage. Techniques are basically dialing down your output then utilizing more than one wireless card to re-survey your substantial site or by dipping the ability of your antenna to make the expected output and once more re-surveying your physical site.

  4. #4
    Join Date
    Apr 2008

    Re: Securing wireless connections - WLAN WAP

    I overlook the model number but Cisco Aironet AP has a characteristic to dial down your output signal. I would guess other mfg's may as well have the similar alternative, the low end AP don't. (Linksys, Netgear, Dlink, SMC and the like) This was as of previous summer so possibly a few more do.

    The other domestic trick(s) is to lag you antenna with electronic insulation I.e. electrical tape, chicken wire which doesn't wrap the complete antenna etc, these either chunk or disrupt the output signal. Therefore the chicken wire sounds mad but you will read regarding it in your manual if your building has splash walls it may have been installed with wire net that turns the signal strength and quality. It's even in the Linksys manual.

Similar Threads

  1. No Wireless Connections Available in windows 7
    By Rooney W in forum Operating Systems
    Replies: 5
    Last Post: 20-05-2011, 10:26 AM
  2. How to set up Wireless WLAN
    By Orochimaru in forum Networking & Security
    Replies: 5
    Last Post: 13-04-2011, 10:13 AM
  3. How do I restrict the wireless connections except my
    By mich43 in forum Networking & Security
    Replies: 4
    Last Post: 15-01-2011, 10:31 PM
  4. Unable to turn off the 3G and WLAN connections in Nokia N8
    By Hadassah in forum Portable Devices
    Replies: 4
    Last Post: 26-11-2010, 07:37 AM
  5. securing wireless access
    By argie01 in forum Networking & Security
    Replies: 3
    Last Post: 20-04-2009, 05:14 PM

Tags for this Thread


Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
Page generated in 1,674,826,550.13844 seconds with 17 queries