123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Guidelines For Providing Proper Wireless Access Point Configuration And A More Secure Network Topolo

Profile Picture
By Author: unknownmem
Total Articles: 128
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In addition to designing proper security for wireless clients, designing security for Designing exam(http://www.mcse-70-297.com)
networks consists of providing proper configuration of the wireless access point and providing a more secure network topology configuration.
Design Considerations for Securely Configuring Wireless Access Points By default, many wireless access points are configured in the least secure mode and many wireless access points remain highly insecure. Wireless net'works are subject to different attacks than wired networks, and they introduce new threats to the wired network. The following security configuration can be implemented to protect the wireless access point and the wired network that it is connected to.

Change the default Server Set ID (SSID). The SSID identifies the wireless access point and thus its wireless network. If the wireless access point is correctly configured, only clients that are configured with the same SSID can communicate with it. Think of the SSID as a simple shared password. As with a shared password, eventually everyone knows it and its use provides no security ...
... at all. All wireless access points come configured with a default SSID. (Some default passwords are tsunami, 101, Default SSID, WLAN, Intel, link-sys, and wireless.} Because default SSIDs are widely known, using the default SSID provides no security. Changing the SSID might provide little protection, however, because many MCSE 2003 exams(http://www.mcse-70-297.com)
wireless access points broadcast their SSID and many wireless clients listen and identify the network to the user, or they might even automatically attempt to connect to it. Even if WEP is configured, the SSID is not encrypted. The 802.11 standard does not call for encryption of the wireless management packets. Still, having a unique SSID is a start.
Turn off the SSID broadcast. Some wireless access points can be configured not to broadcast the SSID. This will prevent an attacker from obtaining the SSID by sniffing for the broadcast. However, the SSID will be transmitted in the clear when a legitimate client connects to the access point. An intruder needs only to sniff and wait for a legitimate client to connect and capture the SSID. Turning off the broadcast is not a significant security step, but it does keep the casual CCNA exam(http://www.upcert.com)
interloper off the network.

Total Views: 396Word Count: 363See All articles From Author

Add Comment

System/Network Administration Articles

1. The Real Difference Between Ai Tools And Ai Systems
Author: Orson Amiri

2. Document Manager Software: Tools To Organize Business Files
Author: DocSmart Solutions

3. Best Online Cybersecurity Training Institute In India
Author: securium Academy

4. Mechanical Optical Switch: Reliable Light Routing For Optical Networks
Author: Ryan

5. Optical Switches: Enabling Fast And Flexible Optical Networks
Author: Ryan

6. Fiber Cable Stripping Machine: Precision And Efficiency In Fiber Optic Processing
Author: Ryan

7. 20% Off PmpĀ® Certification: Turn This Christmas Into A Career Milestone
Author: securium Academy

8. The Fiber Jumper Production Line: Streamlining The Manufacturing Of High-quality Fiber Optic Cables
Author: Ryan

9. The Fiber Coupler Production Line: Enabling Efficient Signal Distribution In Fiber Optic Networks
Author: Ryan

10. Top 10 Cyber Threats Of 2026 And How To Prepare For Them
Author: securium Academy

11. Cloud Technology Solutions For Businesses: Improve Efficiency & Growth
Author: Venttech

12. Ethical Hacking Training Institute Building Future Ready Cybersecurity Experts
Author: Hanna Vahab

13. How Oscp Certification Opens Doors To Global Cybersecurity Roles?
Author: securium Academy

14. Fiber Optic Cable Production Line: The Backbone Of Modern Connectivity
Author: Ryan

15. Fiber Cable Production Line: Revolutionizing Connectivity
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: