considerations for implementing network 2020
considerations for implementing a network
wireless network can easily practice for securing.and implementing. there are several practices for securing and simpler wired networks. these practices are discussed below.
wireless specific
hardware. thus, the practices for securing sid) is the network uld be changed during
wireless network signal can
easily be detected with the hardware security compromises exist in such
networks. several practices wireless networks as follows:
• changing default ssid:
service set
identifier (ssid) is the name for wireless network. the default ssid should be
changed the configuration so that other devices can identify it. for securinn
password, channel number and encryption must be facilitated.
setting encryption:
traffic can be made cryptic to outsiders and
insiders with no public key by encryption. there are three encryption schemes:
wep (wireless
encryption protocol) which provided a 40-bit key initially and later
strengthened to 128-bits.
WPA (wi-fi protected access) overcome the
shortcomings of the web and can be combined with encryption standards such as (temporal key integrity protocol). later, WPA-2 came which is a secure
implementation of WPA that uses both and AES (advanced encryption
standard)
WPS (wi-fi protected setup) automates the process of
setting up an access point securely disabling SSID broadcast: by default, SSID
is broadcast by the router every few seconds. it is advisable to disable this.
antenna and access point placement:
for a
making a network robust in such a way that clients can connect irrespective of
their location in the building, antenna and access point placement is
necessary.
radio
power levels:
the size of the coverage range can be control
by adjusting the power of transmitting radio.
he can be controlled
change default usernames and passwords
network hardware such as router witches and encryption mechanisms
I as router, switches and encryption mechanisms used usernames and passwords for authenticating users and thus, Following
configuration of devices. the passwords must be changed repeatedly and stronger
passwords must be used each time they are changed. enable mac filtering
every network is assigned a unique 48-bit
hexadecimal mac address. users having access to a wireless network can be
limited by filtering devices using mac addresses. due to this, all the
neighboring devices can't access the network.
assign static IP addressing IP addresses are assigned automatically by DHCP protocol. this saves time and effort by managing and assigning addresses from the address pool. but these are temporary addresses and may change periodically. clients must be configured to join the network by assigning static IP addresses. firewall settings must be enabled so that unwanted traffic is filtered and, network address translation (nat) can be performed to enable hosts configured with private IP addresses.
port forwarding/mapping if a server application from the network is to be run and made accessible to the internet, then port forwarding is set. port forwarding refers to the process where the router takes requests and sends them
from the internet to a designated host on the network. it allows the firewall to change ports and addresses to any available port and address. disabling ports once port forwarding/mapping is done, the ports/addresses should be
disabled in order to control the traffic. content filtering/parent controls content filtering or parental controls filter specific traffic based on the keywords. the restricted content can be accessed by the parents (trusted IP
addresses) through parental control settings.
No comments:
Post a Comment