This website includes Education Information like a programming language, job interview question, general knowledge.mathematics

Education log

PageNavi Results No.

Ads

Tuesday, March 31, 2020

considerations for implementing network 2020



considerations for implementing network 2020



considerations for implementing a network

wireless network can easily practice for securing.and implementing. there are several practices for securing and simpler wired networks. these practices are discussed below.

 

wireless specific

hardware. thus, the practices for securing sid) is the network uld be changed during

 

wireless network signal can easily be detected with the hardware security compromises exist in such networks. several practices wireless networks as follows:

 • changing default ssid:

service set identifier (ssid) is the name for wireless network. the default ssid should be changed the configuration so that other devices can identify it. for securinn password, channel number and encryption must be facilitated.

 

setting encryption:

  traffic can be made cryptic to outsiders and insiders with no public key by encryption. there are three encryption schemes:

 

wep (wireless encryption protocol) which provided a 40-bit key initially and later strengthened to 128-bits.

 

WPA (wi-fi protected access) overcome the shortcomings of the web and can be combined with encryption standards such as (temporal key integrity protocol). later, WPA-2 came which is a secure implementation of WPA that uses both and AES (advanced encryption standard)

 

WPS (wi-fi protected setup) automates the process of setting up an access point securely disabling SSID broadcast: by default, SSID is broadcast by the router every few seconds. it is advisable to disable this.

 

antenna and access point placement:

  for a making a network robust in such a way that clients can connect irrespective of their location in the building, antenna and access point placement is necessary.

 radio power levels:

the size of the coverage range can be control by adjusting the power of transmitting radio.

he can be controlled

change default usernames and passwords network hardware such as router witches and encryption mechanisms

I as router, switches and encryption mechanisms used usernames and passwords for authenticating users and thus, Following configuration of devices. the passwords must be changed repeatedly and stronger passwords must be used each time they are changed. enable mac filtering

 

every network is assigned a unique 48-bit hexadecimal mac address. users having access to a wireless network can be limited by filtering devices using mac addresses. due to this, all the neighboring devices can't access the network.

assign static IP addressing IP addresses are assigned automatically by DHCP protocol. this saves time and effort by managing and assigning addresses from the address pool. but these are temporary addresses and may change periodically. clients must be configured to join the network by assigning static IP addresses. firewall settings must be enabled so that unwanted traffic is filtered and, network address translation (nat) can be performed to enable hosts configured with private IP addresses.

port forwarding/mapping if a server application from the network is to be run and made accessible to the internet, then port forwarding is set. port forwarding refers to the process where the router takes requests and sends them from the internet to a designated host on the network. it allows the firewall to change ports and addresses to any available port and address. disabling ports once port forwarding/mapping is done, the ports/addresses should be disabled in order to control the traffic. content filtering/parent controls content filtering or parental controls filter specific traffic based on the keywords. the restricted content can be accessed by the parents (trusted IP addresses) through parental control settings.


No comments:

Post a Comment