Ten countermeasures to prevent hacker intrusion into the Wireless Network

Source: Internet
Author: User

The following articles mainly describe the top ten countermeasures to prevent hackers from intruding into the wireless network. "wireless security" is no longer a big concept. Current network security tools, performance, and protocols can provide better protection for wireless networks.

So how can users reduce or even eliminate the risk of hackers entering Wi-Fi or 802.11 standard Wireless LAN? First, you must control the qualifications for entering the network, that is, authentication. Second, protect the information sent in wireless mode, that is, data encryption.


The following are 10 countermeasures provided by 3Com to prevent wireless networks from being attacked by hackers.

Ten countermeasures to prevent hacker intrusion into the wireless network 1. Correctly place access point devices of the Network

Start from the basics: in network configuration, ensure that wireless access points are placed out of the firewall.

2. Use MAC to prevent hacker attacks

Use the MAC address-based ACLs (access control table) to ensure that only registered devices can access the network. MAC filtering technology is like adding a lock to the front door of the system. The more obstacles you set, the more difficult hackers will find and have to turn to other low-security networks.

3. Manage the ID of the wireless network effectively

All wireless LANs have a default SSID (Service Identifier) or network name. Change the name immediately, represented by text and numbers. If an enterprise has network management capabilities, it should change the SSID periodically. Do not use this name everywhere: cancel the SSID automatic playback function.

Ten countermeasures to prevent hacker intrusion into the wireless network 4. Importance of the WEP Protocol

WEP is the standard network security protocol for 802.11b wireless LAN. When transmitting information, WEP can encrypt and transmit data wirelessly to provide protection similar to wired transmission. The default value of the WEP key should be changed immediately after simple installation and startup. The best way is WEP password? Dynamic changes can be made after a user logs on. In this way, hackers need to keep track of such changes to obtain wireless network data. Based on session and user WEP password? Management Technology can achieve optimal protection and add another protection layer to the network.

5. the WEP protocol is not omnipotent.

You cannot forward encryption protection to the WEP protocol. WEP is only one layer of multi-layer network security measures. Although this technology plays an important role in data encryption, the security of the entire network should not only rely on the security performance of this layer. However, it is difficult for many network administrators to accept this idea.

6. VPN is one of the best network security technologies.

If every security measure is to block hackers from accessing the front door of the network, such as SSID changes, MAC address filtering, and dynamically changing WEP passwords ?, Therefore, virtual network (VPN) is the key to protecting the security of network backdoors. VPN has higher network security (Layer 3) than WEP protocol, and supports end-to-end secure tunnel connections between users and networks.

7. Improve existing RADIUS services

Remote users of large companies often use RADIUS (remote user dialing Authentication Service) to perform Network Authentication and logon. Enterprise IT network administrators can integrate wireless LAN into existing RADIUS architectures to simplify user management. This not only achieves Wireless Network Authentication, but also ensures that wireless users and remote users use the same authentication method and account.

8. Simplified Network Security Management: integrated wireless and wired network security policies

Wireless Network security is not a separate network architecture. It requires different programs and protocols. Policies that combine wired and wireless network security can improve management and reduce management costs. For example, a single integrated user ID and password are used for both wired and wireless access to the network.

Ten countermeasures to prevent hacker intrusion into the wireless network 9. Different WLAN devices are the same

Although 802.11b is a standard protocol, all devices that have obtained Wi-Fi logo authentication can communicate with each other in basic functions, not all such wireless devices are completely equal. Although Wi-Fi authentication ensures interoperability between devices, many manufacturers do not provide enhanced network security.

10. non-professional personnel cannot build a wireless network

Although the construction of Wireless LAN is quite convenient now, non-professional personnel can install wireless routers and access point devices in their own offices, but they seldom consider the network security during the installation process, you only need to scan the network through a network probe tool to leave a backdoor for the hacker to attack. Therefore, without the consent and participation of a professional system administrator, you must restrict the construction of a wireless network to ensure the security of the wireless network.

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.