Network security of Wireless LAN

Source: Internet
Author: User

The security of WLAN wireless networks is defined in the following four levels:

1. Spread Spectrum and frequency hopping wireless transmission technology make it difficult for the hacker to capture useful data;
2. Set strict user passwords and authentication measures to prevent illegal user intrusion;
3. Set up an additional third-party Data Encryption solution, which is hard to understand even if the signal is stolen.
4. Adopt network isolation and network authentication measures;

1. Extended Technology

The Extended Spectrum Technology was first publicly introduced by the military 50 years ago for secure transmission. From the very beginning, it was designed to defend against noise, interference, congestion, and unauthorized detection. The extended frequency storage transmitter emits a very weak power signal in a wide frequency range. In contrast to narrowband RF, it concentrates all the energy into a single frequency point. There are multiple implementation methods for extended near spectrum. The two most common methods are direct sequence and frequency hopping sequence.

2. User Authentication-password control

We recommend using password control on wireless network sites-of course, it is not necessary to be confined to wireless networks. Network operating systems and servers such as Novell NetWare and Microsoft NT provide built-in multi-level security services, including password management. The password should be under strict control and should be changed frequently. Wireless LAN users need to include mobile users, while mobile users tend to move their laptops. Therefore, strict password policies increase the security level, it helps determine whether the website is being used by legal users.

3. Data Encryption

If your data requires extremely high security, such as commercial or military data, you may need to take some special measures. Finally, the most advanced security measure is to use encryption products on the network as a whole. Data in the data packet must be encrypted by software or hardware before being sent to the LAN. Only websites with the correct key can recover and read the data. Encryption is the best way to ensure comprehensive security. Some network operating systems have encryption capabilities. Based on each user or server, third-party encryption products with low price can also be competent, encrypted products such as NetCrypto or Captial Resour-ces Snare of McAfeeAssicoate ensure that only authorized users can access the network and read data, and each user only needs to pay about $50. Given that third-party encryption software developers are committed to encryption transactions, they can provide users with the best performance and quality. Service and Technical Support. WLAN prefers to use third-party encryption software.

4. Other Wireless Network considerations

Wireless LAN also has some other good security features. First, the Wireless Access Point filters out network data that is useless to the relevant wireless sites, which means that most wired network data will not be transmitted in the form of radio waves. Second, wireless network nodes and access points have an environmental-related forwarding range limit, which is generally several feet. This means that the eavesdroppers must be in the vicinity of a node or access point. Finally, wireless users are mobile, and they may move from one access point to another during an Internet access period, the frequency hopping sequence they use for network communication also changes, making eavesdropping almost impossible.

Conclusion

No matter whether there is a wireless network segment, most lan must have a level of security measures. In the face of internal curiosity, external attacks and wire eavesdropping, and even wired networks are all very fragile. No one is willing to take the risk of exposing data on the LAN to non-fast customers and malicious attacks. Moreover, if your data is confidential, such as those on the banking and military networks, you must take special measures to ensure confidentiality. We hope that you can learn from the above discussions the importance of protecting your entire network security, and realize that your LAN wireless network segment is or cannot provide more protection than the wired network segment, or at least the same as it.

Related Articles]

  • Security Management Network starts with IP Address
  • LAN security
  • Research and Test of Wireless LAN security technology

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.