Complete security analysis of Wireless LAN Settings

Source: Internet
Author: User

The security of wireless networks has been plagued by a large number of network users. So what aspects should we solve? Here we will introduce it in detail. Wireless Networks show their advantages: mobility, simple installation, high flexibility, and scalability. As an extension of traditional wired networks, wireless networks have been widely used in many special environments. In the past, movies often appeared in our real life to move office anywhere in the smart building, download documents anytime, anywhere, and print documents.

However, the security of Wireless LAN is worth noting. Because the transmitted data is transmitted by means of radio waves in the air, radio waves can penetrate the ceiling, floor, and walls, transmit data may arrive at receiving devices outside of expectation, installed on different floors, or even outside the building where the transmitter is located. Anyone has conditional eavesdropping or interference information, data security has become the most important issue.

Therefore, when we first applied wireless networks, we should fully consider their security and understand enough preventive measures to protect our own networks. Next, we will introduce the risks faced by wireless LAN and know how the risks exist, so it is easier for us to solve them again:

Wireless LAN Security Settings: Easy intrusion

Wireless LAN is very easy to detect. In order to enable users to discover the existence of wireless networks, the network must send beacon frames with specific parameters, so as to provide necessary network information to attackers. Intruders can use high-sensitivity antennas to launch attacks on networks from road borders, buildings, and anywhere else without any physical intrusion.

Wireless LAN security: Illegal AP

Wireless LAN is easy to access and easy to configure, making it a headache for network administrators and security officials. Any computer can connect to the network without authorization through the AP purchased by itself. Many departments build their own wireless LAN without authorization from the company's IT center. Illegal AP access brings great security risks to the network.

Wireless LAN Security Settings: authorized service

More than half of users only make few changes based on the default configuration when using the AP. Almost all APs enable WEP Encryption Based on the default configuration or use the default key provided by the original manufacturer. Due to the open access method of the wireless LAN, unauthorized use of network resources will not only increase bandwidth fees, but also lead to legal disputes. In addition, unauthorized users do not comply with the terms of service proposed by the service provider, which may lead to service interruption by the ISP.

Security of Wireless LAN Settings: service and performance restrictions

The transmission bandwidth of the wireless LAN is limited. Due to the overhead of the physical layer, the actual maximum effective throughput of the wireless LAN is only half of the standard, and the bandwidth is shared by all AP users. Wireless bandwidth can be swallowed up in several ways: network traffic from wired networks far exceeds the bandwidth of wireless networks. If attackers send a large amount of Ping traffic from fast Ethernet, it will easily swallow the limited bandwidth of the AP;

If broadcast traffic is sent, multiple APs are blocked at the same time. attackers can send signals over the same wireless channel in the same wireless network, in this way, the attacked network will automatically adapt through the CSMA/CA mechanism, which also affects the transmission of wireless networks. In addition, transmission of large data files or complex client/server systems will generate a large amount of network traffic.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.