Introduction to wireless network security policies

Source: Internet
Author: User

The use of wireless networks has entered our lives. But how should we solve the common network problems? Here we will give a detailed introduction to network faults.

The wireless LAN based on the standard, also known as Wi-Fi network, has gradually developed into the mainstream network from the application in the traditional warehouse and plant environment. As a result, fault diagnosis and security assurance for wireless networks are equally important to network technicians or engineers as for wired networks.

Handheld, wired and wireless integrated analyzer is particularly useful. Through such a device, technicians can diagnose both wireless networks and wired networks, so that they can quickly identify whether the fault is caused by a wireless network problem or a wired network problem, or it is a network problem. In this way, users who are constantly adding mobile apps can maximize their work efficiency.

Wireless Network Environment Based on Wireless Network Security Policies

Wi-Fi is configured in several modes, including peer-to-peer mode, bridging mode, switching mode, and mesh mode. Good tools can work with devices in different modes, analyzes RF channels and protocol types, and quickly locates faults. For example, a device can be used to test the connection interfaces of four different network modes by device type.

Network Structure of wireless network security policy

The Ad-hoc network is composed of client devices. These client devices are in a working group, and client devices can communicate directly through wireless NICs. An Ad-hoc network may cause security issues. Unauthorized users may automatically communicate with legal users, which may obtain some sensitive data or access the wired network through a wireless network.

The wireless infrastructure consists of Wireless Access Point AP, which can be connected to a wired network or a wireless switch. AP provides RF signals for clients. It can also be configured in point-to-point mode to bridge wireless networks between different buildings. For example, AP can be used to isolate two buildings by parking lots.

The network of another basic architecture is a mesh structure, which is also composed of APs, which can communicate with each other through the wireless routing protocol. The mesh structure can communicate with the wired network through an AP connected to the wired network. The mesh structure can reduce cabling engineering, reduce cabling costs for interconnection between each AP, and improve scalability and flexibility.

Multi-mode channel scanning based on wireless network security policies

Wireless network adapters and APs are commonly used in the 802.11 standard group. Among them, 802.11b and 802.11g work in the GHz band and 802.11a work in the 5 GHz band. These standards are used in enterprise-level network environments and are expected to have the most non-interference channels for business networks to avoid RF signal interference, optimizes WLAN performance.

Even if an enterprise uses only one 802.11 standard WLAN, it is recommended to use a tester that supports three Standard 802.11b, a, and g because it can scan all channels. Otherwise, your enterprise will bring security risks from the ad-hoc mode or malicious AP.

Analyzer that supports multiple modes can scan all channels in the 802.11 frequencies, including the GHz and 5 GHz frequencies, and display them in a graphical form. You can check whether the configurations are reasonable from these charts, what is the SNR, how much bandwidth can be used, and other problems. If a certain AP has outstanding traffic, it may be because many clients are surfing the Internet through this AP. On the other hand, it may also be because a special application or protocol is occupying a lot of bandwidth. Technicians carrying wireless analyzer can search for "the most frequently sent traffic" to quickly determine whether there are MP3 downloads, BT downloads, and other applications. These applications may need to be disabled in wireless networks.

RF signal faults in wireless network security policies

Different from wired networks, the performance of wireless networks is affected by changes in the AP and client locations and environments. Because the clients connecting to the AP are mobile, it is a challenge to deploy the AP reasonably. In addition, when the AP is overloaded, or when a client is roaming to a location where the RF signal is weak, it may cause a wireless network blind zone.

Some remote dead-corner locations also have blind spots because APs are not installed. These blind spots may affect some applications, such as VOIP applications based on wireless networks. Sometimes, despite the signal survey, however, changes in the physical environment also affect signal changes, so that the client cannot communicate with the AP. For example, furniture movement, metal file cabinet movement, microwave oven installation, or other wireless household appliances.

Wireless Network security policies eliminate network speculation

The main difficulty is that users have insufficient experience in using wireless networks, or even have no knowledge about wired networks. according to reports, 22% of user faults were integrated in network products, cables and connectors last year, and 69% of faults were attributed to servers and applications.

If you are not aware of the problem, the network administrator must determine the cause of the network failure. In many cases, the application support staff must be clear about whether the network is faulty.

Troubleshooting steps for wireless network security policies

When a user encounters a Wi-Fi connection failure, IT usually asks for help from internal IT support personnel. The phone call may not be enough and someone else needs to go.

If the user has a logon problem, the network administrator needs to locate the fault location. Using a hand-held instrument, you can test the wired network or wireless network, which can quickly find the root cause of the problem.

If the technician can successfully log on to the wireless network from the client using the tester, the problem may be caused by the configuration or permission of the client device. If the tester cannot connect to the server, the problem may be in the physical layer of the wireless or wired network. In addition, insufficient bandwidth, request queuing timeout, and conflict interference may also be the root cause of the fault.

Network administrators can use a wireless tester to scan the wireless network environment from the faulty location to measure the signal strength and AP performance. The tester can use a passive scan mode without logging on to the AP. In passive mode, the wireless network card of the tester only receives signals and does not send data. If the RF quality can meet the requirements, the administrator can log on to the wireless network in client mode for testing, such as logon test, PING, and throughput test.

In general, the Administrator must verify whether the client configuration is consistent with the business security mode. (For example, EAP ). If the security mode is different, logon is affected.

A good hand-held instrument should have a comprehensive Wired/wireless analysis function, which can monitor and diagnose whether each step of the login network is successful and locate the failure. If the server rejects user logon, the problem may be related to the authentication server itself, the user's security configuration, or the user's access permissions. Enhanced monitoring of EAP can reduce such faults.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.