Talking about four aspects to ensure Wireless Network Security

Source: Internet
Author: User

Network components and planning design can determine what is needed to ensure the security of the local computer, but for any network connected to the Internet, there are some things that are necessary. You can take some simple measures in advance to make your network and data more secure.

Several Basic Security Questions

The first step to ensure network security is to use the standard features built in the device. Many network devices have some security features to protect users from hacker attacks. If you want to buy a Broadband Router, you should find a device that supports NAT firewall and MAC address filtering. NAT firewall can hide your network behind the vro, while MAC address filtering allows users to permit or prohibit access to specific machines on the network. NAT usually runs automatically and does not require any configuration. MAC address filtering requires you to enter the MAC address of the computer you want to reject or allow.

Generally, wireless network devices include WEP or WPA encryption. Both encryption methods help protect the network, but WPA is more robust and secure than WEP. To implement WPA or WEP, you need to enter an encryption key on all wireless devices in the wireless network. Generally, the product user manual includes a detailed guide on how to configure the encryption key.

In short, basic security requires users to consider at least the following aspects:

Do you have a NAT firewall between the Internet and the local network? Have you enabled MAC address filtering?

Have you enabled WPA or WEP encryption for the wireless client?

Anti-Virus Software

The basic functions of anti-virus software are the same, but users must consider the following aspects:

Does this software support Automatic Updates to facilitate detection of new viruses? How quickly does it scan viruses?

Can it scan and clear attachments of instant messaging programs?

Does it come with a software firewall?

Does virus removal require user participation?

Software Firewall

When you open an email message, the email server sends data to a port on the computer. The Web server uses another port to send Web pages, while the instant messaging program uses another port to send messages. The firewall manages the communication through these ports. It can block or allow access. Sometimes it asks the user if they want to permit a connection to be opened? Most firewalls include a common rule set that allows users to set the permitted and prohibited types of communication.

When examining software firewalls, you need to consider the following issues:

Is it easy to use? Support for telephone help?

Have you passed the firewall test of an authoritative department?

Is there any anti-virus software?

Hardware firewall

Many routers have built-in hardware firewalls. If your router does not exist, you should buy an independent hardware firewall device.

The hardware firewall works in the same way as the software firewall, but it has its own advantages. The software firewall must be installed on each network computer, and the hardware firewall can centrally control the communication connections between the network and the Internet. Therefore, users can say with certainty that, all hardware in the network works according to the same rules. The hardware firewall also uses its own processor to perform port filtering and encryption tasks, which means that it is almost impossible to exhaust resources in the computer, which gives users better overall performance. Some firewalls allow users to establish VPN connections from the Internet to the LAN, which allows users to access their computers even on the road.

You need to consider the following aspects about the hardware firewall:

How many ports does it have? Can it perform status packet check?

Can it establish a VPN connection?

How many VPN tunnels does it support at the same time?

  1. Global Wireless Network Security Issues
  2. Security becomes a big problem of enterprise wireless network experts teach you how to deal
  3. Key security technologies of wireless Heterogeneous Networks

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.