Traditional wired network management methods and technologies can be easily transferred to wireless networks when special wireless network tools and technologies are used, it also helps maintain the smoothness, reliability, and security of the network. Network administrators can use the widely used basic layer-7 ISO network model physical layer, data link layer, network layer, transmission layer, Session Layer, presentation layer, and application layer ), use the ISO network reference model to organize and describe network activities. When reading the recommended network activities listed for the network manager in this IT check list in alphabetical order), please keep in mind the elements of this network reference model.
◆ Accounting management:Pay attention to the use of various resources and their specific consumption. These include asset management, cost control, and charge-backs. If the IT Department operates as a cost center, the wireless network charge-backs can help to reduce costs based on usage and resource consumption rates.
◆ Configuration Management:This includes creating networks, network addresses, and operations, as well as a detailed list of change control and management, hardware, software, and configuration data.
◆ Fault management:Network Problems, errors, or faults. These include Event Notifications, alerts and warnings, problem identification, troubleshooting, problem solutions, and error or event records.
◆ Performance management:This project measures the performance of the wireless network at any time. It includes network capacity design, availability/failure time, response time measurement, error rate, throughput, and utilization specifications.
◆ Security management:This project refers to the security of networks and nodes. It includes security requirements and implementation, authorization, access control and audit tracking, security event records, and Identity Authentication failures. Remember, wireless networks are more likely to cause broadcast leaks.
Although accounting management is not the first in the list of tasks you want to do, it must be routinely executed like other tasks. A little planning and structure design is helpful for the establishment and maintenance of necessary control. Here is the step to ensure the establishment of a top-notch wireless network:
1. device layout and Signal Management:AP, or WAP, is a device used to connect a wireless network bridge to a wired network. The layout of the wireless network interface antenna is the key to achieving good results. The use of wireless network signal strength measurement tools is usually tied to the software and drivers attached to the wireless network interface card. After such tools are installed on a laptop or handheld computer, ensures that authorized users can access and use wireless networks. These are also used to troubleshoot performance problems. NetStumbler is a free program for this job.
2. device installation and configuration:Managing a wireless network involves a large number of network identification and Address Allocation issues. Most WAP files include general installation and configuration documents, but not all of them mention modifying the default configuration. When possible, stronger security settings can usually bring the best security effect. These settings include setting the SSIDs reader), disabling the SSID broadcast, and enabling any type of encryption mode, the higher the intensity, the better), so that the wireless network can be better applied.
3. Traffic Monitoring and analysis:The network protocol analyzer or sniffer works with wireless network interfaces to control and measure network traffic, the characteristics of each network traffic, identify harmful access attempts, and block them. Some specialized commercial tools, such as AiroPeek, are usually used for this purpose, but an open-source product, such as Ethereal, can also run in many wireless network interfaces, and can obtain enough information. Because of the free features of open source products, using such tools can bring about low costs.
4. troubleshooting:This will happen on all networks, but it is especially important to use wireless networks. When a mobile user connects a laptop to the network, the administrator needs to quickly learn to identify "blind spots, wireless Network coverage is the best or unavailable in sub-region. More WAP is required to be added. Therefore, administrators must be able to handle typical access and access problems.
5. Construct a correct wireless network connection: According to the natural characteristics of wireless network traffic broadcast, even if the hardware is near your local firewall, when users access network resources, WAP and wireless network interfaces must be used as external devices of the firewall, to make them accessible. This means that WAP needs to be used as the DMZ isolation zone. Logically, it is not physically). Before allowing access to the internal network and its resources, traffic is sent through the firewall and wireless network, VPN is used to connect two wireless network users and their networks. It is very important to prevent external users from accessing your network. By default, Windows always log on to the first wireless network it finds, so it is equally important to configure the wks to log on to the correct network.
6. penetration testing/Vulnerability Assessment:"Do anything you can think of before others do it ." For wireless networks, this detection ensures that external users cannot access your wireless network wherever they don't want them. Perform Illegal access attempts, drive attack war-driving) and war-chalking tests to locate and fix potential security issues on your network. Regular audits are required. Similarly, they are not frequent, but adequate penetration testing is also a good idea to understand and block external people.
7. Use additional authentication:However, when it comes to its built-in encryption and authentication mechanisms, wireless network 802.11 protocols and services are notorious for being weak. Many experts recommend that you add basic external verification when possible. This requires wireless network users to use a variety of authentication methods, that is, in addition to typical account/password identification, also requires hardware token verification. It also means that it may use Lightweight Extensible Authentication Protocol, LEAP, similar to Cisco's Lightweight Extended Authentication Protocol, which can enhance the strength of Authentication, and add another layer of encryption for wireless network communications. It works well with most of the advanced 802.1x protocol authentication ).
8. Use wireless network management tools:Tools such as AirMagnet, Chantry Beaconworks, and AirWave can expand the capabilities of the wireless network management console and provide valuable practical functions such as traffic monitoring and personalization. If your budget permits, you can purchase and put them into use. This type of tool is particularly helpful when companies intend to adopt policy-based management techniques.
- Policy Analysis of Wireless Network Management
- How does a centrally managed WLAN architecture enhance wireless network security?