Wireless Security is full of challenges and opportunities

Source: Internet
Author: User

It is not easy to protect network security while maintaining moderate access, and the addition of mobility further increases the difficulty. If the balance between security and network access in a wired network is like a steel wire, then the expansion to a wireless environment is like an abyss, and walking on a more fragile steel wire rope under the blow of the wind.

Mobile Security has the following problems:

● Unauthorized access point: Unauthorized network expansion is caused by unauthorized access points being introduced.

● Access Control and Data Security: controls which users can log on to the network and ensures data security for valid users.

● Wireless Threat Management: the capability of attackers who attempt to initiate DoS attacks on the network.

● Problematic mobile clients: laptops infected with viruses, spyware, and malware are connected to the network.

In the past, network vendors used both wired and wireless networks and operated independently. Therefore, security is far from the same. However, ProCurve Networking by HP has adopted the overall network infrastructure architecture solution from the very beginning-a solution that will benefit you a lot.

Unified wired and wireless networks

Because our active defense security solution comes from the foundation of ProCurve's overall adaptive edge architecture (AEA), it can comprehensively and uniformly handle security issues, both wired and wireless. This means that the Network Administrator does not have to deal with two sets of wired and wireless) independent security features and policies. They can concentrate on ensuring good security and balanced user access.

Other challenges of Mobile Security

As mentioned above, mobile security has indeed brought about some special challenges. ProCurve proactively defends against every problem:

Illegal access point:

ProCurve Manager Plus 2.2 and the latest ProCurve Mobility Manager 2.0 plug-ins help you build a trusted network infrastructure architecture. ProCurve Mobility Manager 2.0 provides a single-screen integrated dashboard for managing wireless networks at the device level or across the network.

In addition, the ProCurve Wireless Edge service zl module works perfectly with the ProCurve Switch 5400zl edge Switch and Switch 8212zl core Switch, and works with the ProCurve wireless port to provide centralized Wireless LAN (WLAN) for advanced wireless services) configuration and management. The ProCurve Wireless Edge service zl module provides an illegal Access Point Detection Function to systematically view all access points detected in the coverage area of the wireless LAN.

Access Control and Data Security:

ProCurve Identity Driven Manager (IDM) 2.2 dynamically configures security and performance settings based on the user, device, location, time, and client system status. With IDM, You Can centrally define and apply policy-based network access permissions, so that when users and devices connect to the network anytime and anywhere, the network can automatically meet their needs.

Wireless Threat Management:

ProCurve Network Immunity Manager can detect and automatically respond to threats, such as virus attacks inside the Network. In addition, it can perform network behavior exception detection (NBAD) to detect various attacks.

In addition, another important aspect of network immunity is that ProCurve 5400zl, 8212zl, ProCurve Wireless Edge service module zl, and many other ProCurve products have built-in security and traffic monitoring functions, such as sFlow, virus containment, and remote image technology.

Problematic mobile clients:

ProCurve Network Access Controller 800 is particularly useful in ensuring that only "secure" mobile devices can Access the Network. It not only has a RADIUS-based verification server, but also can verify the integrity of the system connected to the network. Network Access Controller 800 is managed by the ProCurve Manager Network management platform. Therefore, you can further strengthen the unified management of devices and security on wired and wireless networks.

  1. What if WPA breaks wireless security?
  2. Wireless Security's eight-pronged approach keeps hackers away

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.