How Enterprises solve the security problem of Wireless LAN

Source: Internet
Author: User
Tags strong password

We have been talking about the security of wireless networks. How can we solve the problem of network security in enterprises? Here we will give you a detailed explanation. What is obviously different from a wired LAN network is that a wireless LAN network transmits signals through a microwave, which is invisible, therefore, the signal transmission security of the wireless LAN makes many wireless Internet users a little worried. In fact, as long as we are familiar with the signal transmission mechanism of the wireless network, we can use some targeted security protection methods, we will be able to ensure the security of the wireless LAN.

Managing passwords for enhanced wireless nodes for wireless LAN security

Once illegal users in the vicinity of a wireless LAN find a local wireless node, they often try to log on to the background management interface of the wireless node and modify its wireless network parameters, if they have guessed the password, the local wireless Internet access parameters may be modified randomly by illegal users, resulting in the Local Wireless LAN network not working properly. More seriously, once these illegal users change the background management password of the wireless node, even the local network administrator may not be able to enter the background interface of the wireless node to manage and maintain the wireless Internet access device.

Because the background management passwords set by default by many wireless node devices are relatively simple, for example, set the password to "admin", "0000", "1234", or "aaaa. If we do not promptly modify these default backend management passwords and connect our wireless node devices to the wireless network, when an illegal user uses professional tools to learn the manufacturer and model of the local wireless node device, the management password of the local wireless node device will undoubtedly be obtained by the illegal user, at this time, the security of the local wireless network will be seriously threatened. Therefore, before connecting a wireless node device to a wireless network, you must follow the instructions to log on to the background management interface of the device and find the options for modifying the background management password, the default password is changed to a strong password to ensure that illegal users cannot guess the management password of the wireless node, so as to ensure the security of the local wireless LAN.

Disable point-to-point working mode for wireless LAN security

Generally, common workstations in a wireless LAN often have two basic working transmission modes: the basic architecture mode and the point-to-point working mode. When the wireless LAN network uses the basic architecture mode, all wireless workstations in the LAN need to use a wireless router device for signal processing. In other words, whether we are surfing the web content online, or share transmission and communication with other workstations in the same LAN. All data signals of the wireless workstation must go through the wireless router device. Most wireless LAN networks belong to this type.

If a wireless LAN network works in point-to-point mode, the interaction between the workstation and the workstation in the wireless LAN can be carried out directly without the need of a wireless router or other wireless node equipment. In some specific situations, this work mode is more conducive to the rapid network access of workstations. For example, if we want to share the transfer files with other workstations in the LAN, we can choose the point-to-point work mode. However, if we enable the point-to-point mode, illegal users in the vicinity of the local wireless network can secretly access important private information in the local network without knowledge, in this way, the security of local wireless LAN will be greatly reduced.

Wireless LAN security-denial of Broadcast Wireless Network identifier

To make it easy for common workstations in a wireless LAN to quickly discover devices connected to a wireless node, each device on a wireless node basically has a network service ID name, this name is generally called the SSID identifier of a wireless node. A common workstation can establish a normal wireless network connection with a wireless node device only through this identifier. If you do not know the SSID identifier, therefore, normal workstations cannot be added to a wireless LAN. Therefore, to prevent unauthorized users from secretly using the local wireless network, we must try to prevent unauthorized users from knowing the SSID identifier information of the Local Wireless LAN.

Of course, you should note that if an illegal user already knows the local wireless network SSID identifier, even if we refuse the wireless router to broadcast the wireless network identifier information in the future, illegal users can also secretly join the local wireless network. Therefore, when we set the SSID name information for wireless node devices, we should try to make the name more complex, do not be too fragile or simple, so that illegal users cannot guess the SSID identifier name of the local wireless network.

Wireless LAN security: using encryption to protect wireless signals

In addition to the above methods to protect the security of the wireless LAN, there is also a more effective protection method, that is, to encrypt the wireless transmission signal, this method often has a high security protection effect.

Currently, there are two common encryption methods for wireless node devices: WEP encryption and WPA encryption. Among them, WEP technology is also called Peer-to-Peer security technology. Generally, RC4 symmetric encryption is performed at the network link layer. The key content of wireless Internet users must be exactly the same as that of wireless nodes, in order to access the network content correctly, this effectively prevents unauthorized users from secretly accessing the local wireless network through monitoring or other attack means. Normally, WEP encryption technology provides several key algorithms with 40-bit, 128-bit, or even 152-bit length for ordinary users. Once the wireless Internet access signal is encrypted by WEP, illegal users in the vicinity of the local wireless network cannot see the specific content even if they steal the Internet transmission signal through professional tools, as a result, the local wireless Internet access signal is not easy to leak, so the wireless LAN data transmission security and receiving security will be greatly improved. In addition, the higher the number of digits used for WEP encryption, the more difficult it is for illegal users to crack wireless Internet access signals, and the higher the security factor of local wireless networks.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.