How to strengthen the security management of wireless network

Source: Internet
Author: User
Tags require

Today, most enterprise-class WLAN products and many SMB products offer built-in guest management capabilities. From simple forced network portals and firewalls to traffic shaping and unique guest logins, such products can be automatically generated without it assistance.

For example, let's look at the guest management capabilities provided by the enterprise-class WLAN cloud controller in Meraki. In order to create a Meraki guest wireless LAN, we need to start with a command to configure an SSID, such as one click or login Start Page. If you select the Start page, the user is redirected to a custom portal, logged in by entering a username and password. The

Guest has three choices to start creating. First, the administrator configures the Guest account. Second, the guest representative can add and delete guest accounts but cannot make other changes, and third, allow guests to use their own account on the entry prompt page, subject to admin approval.

Controlling user activity for the security of guest wireless LANs

The next step is to control the activity of the logged-on user. Consider forcing the network portal to require users to run antivirus software. Then set the allowed destinations, ports and URLs, optionally adding bandwidth throttling and wired/wireless properties. Finally, consider whether guest traffic needs to be bridged to a VLAN or routed to the Internet when local area network access is allowed or not allowed. The cloud controller can analyze traffic to see how the wireless guest network is being used.

These features are typically used for unencrypted guest wireless networks, but they can also be combined with WPA2-PSK to implement encryption. Setting up the PSK can reduce denial of service attacks and prevent external probes. However, the traditional PSK is shared with each user, and they cannot track or cancel the tracking of individual guests. However, some products provide dynamic PSK to each user, such as Ruckus Dpsk and aerohive PPSK can solve such problems.

For example, a ruckus wireless LAN can be set to a unique DPSK for each guest. Anyone with access to the corporate network can request ruckus guest privileges through a Web form, and each publication's guest permissions provide instructions that they can print, including guest name, guest SSID, guest's only DPSK, and expiration date. These settings can even be installed automatically on Windows systems, OS x, and iphone clients, effectively avoiding manual setup and possible errors. Once in effect, the DPSK will automatically expire or be abolished without interrupting any other use.

Device integrity checks on guest wireless networks

These guest management policies provide good visibility and controllable rows on a wireless local area network, including what guests can access and what resources they can use. However, to prevent the damage caused by infected guestsMore measures are needed. According to Gartner, three-fourths of network access control deployments are designed to deal with such threats.

While preventing infected wireless clients from being a guest wireless LAN does not require, guest devices can pose a greater risk because they are not managed by the IT department and generally cannot forcibly install software or configurations required by IT departments, or even perform temporary integrity checks. For example, a mandatory network entry might use ActiveX control to quickly see if a guest is running a licensed antivirus software. However, ActiveX control cannot view non-Windows guest devices or locked browsers.

For some businesses, integrity checks are sufficient for guests who use Windows, after all, viruses are more common in Windows. But other companies may be tempted to block people who cannot check them or restrict them (e.g., HTTP only, no access to the intranet). The third possibility is to use NAC or IDs products, such as Forescout,counteract or Bradford network Sentry, which can run network-based checks. NAC devices can be integrated into existing wireless network facilities to provide guest managers with access control policies that are immediately severed if a virus threat or policy violation is detected on the client.

In summary, the Enterprise Guest network must have efficient user management control to conform to the enterprise specification. And they must provide a solution to the emergency and an effective tracking scheme. With these strategies, companies can safely provide the network to contractors, partners, customers, and other authorized guests without worrying about what is not known.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.