Wireless LAN technology in the development and improvement of continuous improvement, but as a means of network access, in bringing convenience at the same time, there are a lot of security risks. This is because the wireless local area network transmits the information through the radio wave in the air, its mobile equipment and the transmission medium particularity, causes anyone to have the condition or may eavesdrop, disturbs the information, is vulnerable to attack.
Method
Using MAC Address Control table: Create a "M a C Address Control table" inside a P, the Mac listed in the table is a valid, connected wireless network card, otherwise it will be denied connection. With MAC address restrictions, you can ensure that only registered terminals can access the wireless network and use network resources.
Enable wireless Security Gateway: At present many systems such as Win2000, Linux, FreeBSD, etc. are implemented IPSec. Wireless security gateways include support for IPSec, using VPN tunneling technology from users to wireless security gateways. IPSec-enabled wireless security gateways provide powerful security services, including authentication ﹑ encryption and data integrity.
Cryptography: A 128-bit encryption key can be used to avoid being compromised. The appropriate intensity of the important information encryption processing, to ensure that even if the air signal interception, no powerful analysis tools still can not obtain useful information, such as the user's MAC address ﹑ system ID. The receiver must have the correct key to receive the information correctly.
Attention matters
The information security, the network security is starts from the individual, starts from the side, sublimated oneself, consummates oneself, enhances oneself.