--%>

General LAN Security setup

General LAN Security setup: There are certain methods which can be used as general security such as not connecting the wireless network directly to SAMS network. The SSID should be changes on regular basis. After installation of the network the default SSID should be changed immediately. It should also be instructed within the users of the wireless network not to use the default ID at all. When wireless network is not in use, the SSID should be switched off so as to avoid unauthorized usage. The users should also change the SSID on a regular basis. The network should be wired equivalent privacy enabled. In this also the user should never use the default WEP. The WEP key should also be changes from time to time to ensure more security. The wireless network users should use MAC filtering if it is supported by their Wireless LAN. The password set for the administrator should also be changed from time to time. When the access point is not put to use, it should be switched off for a considerable amount of time so as to make it more secure and avoid unauthorized access. The user should update the access point to the firmware time to time. The wireless network should not be connected to the wired network hubs as it makes it prone to unauthorized access. For wireless LAN clients, static IP address should be used. This is because with the usage of DHCP (dynamic host configuration protocol) the attackers can get applicable IP address for entering the wireless network. Therefore Dynamic host configuration should not be used to assign IP to the wireless LAN. The company should make the inventory of all IP addresses for both the access point and the client. This would help the company to take a note of the authorized IP addresses. The IP address should be scanned and audited so as to avoid unauthorized access from attackers. The wireless network should secure its WLAN equipment by not using notebooks in a wireless network.

   Related Questions in Computer Network Security

  • Q : Wired equivalent privacy or WEP-LAN

    WEP (wired equivalent privacy): Wired equivalent privacy is capable of providing the same level of privacy as it is there in the wired network. The WEP makes use of a static key which both the access points and the clients know. The static key helps i

  • Q : Cloud computingb security syntheses +20

    syntheses +20 paper +5 figures starting from introduction until conclusion

  • Q : Competition matrix-Michael Porters

    The competition matrix is a term used while talking about strategy development, first used by Michael E. Porter 1983. They tell about product politics in marketing for individual business fields of an enterprise to gain competition advantage. In this,

  • Q : Cryptographic Systems What are

    What are Cryptographic Systems?

  • Q : What is power analysis Explain the term

    Explain the term power analysis?

  • Q : Categories of security threats Specify

    Specify the four categories of security threats?

  • Q : Wireless Information Security System

    Wireless Information Security System: In any wireless network only secure authorized usage should be given and the company should make sure o putting the best practices into use. The access points should not be given access without putting it through

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio

  • Q : Services by PGP Specify the services

    Specify the services which are offered by the PGP services?

  • Q : Advantages of ReefEdge technology

    Advantages of ReefEdge technology: The advantages of using the ReefEdge technology by an organization are listed below: The system captures the identity of the user who is going to use the system. Therefore the acc