SlideShare a Scribd company logo
1 of 10
Download to read offline
SMC Networks
8 Ways of adding security to your wireless
network
1        Disable the Network Name (SSID)

To make it easy for wireless receivers to find their transmitter, most
wireless devices are configured by default to broadcast a beacon known as a
Service Set Identifier (SSID).

This SSID or network name can be changed to a private name and can also
be hidden (not broadcasted). This way, only receivers that know the correct
SSID will be able to connect to the wireless network.
2        MAC Address Filtering

As a form of physical security, it is possible from the router to only allow
specified networks users to access the wireless network by identifying their
unique Ethernet MAC address associated with each network device. This
gives a level of security similar to staff access cards and identification
badges.
3        WEP/WPA/WPA2

These abbreviations refer to three different encryption standards that can
   be used to secure a wireless network:

a) Wired Equivalent Privacy (WEP) is not considered secure anymore and
   should only be used with legacy equipment that does not support
   WPA/WPA2.

b) WiFi Protected Access (WPA) offers a higher level of wireless security,
   making sure that the data will remain private and access to the network
   is restricted to authorized users.

c) WPA2 has replaced WPA and uses a stronger encryption standard called
   Advanced Encryption Standard (AES).
4        IEEE802.1x

The IEEE802.1x standard describes how to provide authentication and
   authorization using an authentication server that keeps usernames,
   passwords and user rights to access a network in a central database.

This way, a wireless router/ access point will contact the authentication
   server first when a device wants to connect to the wireless network. The
   server checks the user credentials against the database and informs the
   wireless router/ access point if the relevant user is allowed to access the
   network or not, and what are the relevant user rights.
5        Disable DHCP Server

Disabling the DHCP Server of a wireless router will stop it from
   automatically assigning IP addresses to new devices, including potential
   hackers. Instead, the network administrator has to configure new
   devices manually with valid IP address information.
6        IP Subnetting
IP addresses and subnets in home wireless networks are normally
    configured so that 254 users can have a valid IP address. For example:

Router IP: 192.168.2.1
Computer IPs: 192.168.2.2 to 192.168.2.254
Subnet Mask: 255.255.255.0

For additional security, the router could also be configured with a subnet
   that allows to assign 6 IP addresses only. For instance:

Router IP: 192.168.2.1
Computer IP: 192.168.2.2 to 192.168.2.6
Subnet: 255.255.255.248

This way the maximum number of devices in the LAN is limited and external
   customer will need to know the subnet used in the network to be able to
   connect.
7        User name & password of router admin


After being connected wireless or wired to the network, the admin interface
   of the router can normally be accessed by entering its IP address in a
   web browser. With the help of a username and a password, all router
   settings can be changed.

In order to avoid an intruder to be able to login to the network router and
    make configuration changes in the network, it is recommended to
    change the username (if possible) and the password of the router admin
    web interface.
8        Change default IP address range

The wireless routers normally are by default configured with an IP address
   like this

192.168.x.x (for SMC Networks Routers 192.168.2.1)

If you are thinking in disabling the DHCP server so that the router will not
    assign IP addresses to devices, you might want as well to change the
    range of the IP addresses used in your whole network. For example:

10.0.x.x
Router: 10.0.0.1
Other devices: 10.0.0.2-254

This way, possible intruders will not know the IP address range and it will be
   more difficult for them to get connected.
For more technical documents visit us
www.smc.com
Disclaimer: All data has been carefully checked for correctness.
SMC Networks takes no responsibility for possible errors in this document.
All technical specifications are subject to change without prior notice.

(c) 2010, SMC Networks

More Related Content

What's hot

Simple IPv4_Subnetting
Simple IPv4_SubnettingSimple IPv4_Subnetting
Simple IPv4_SubnettingUmer Qureshi
 
How to setup a wireless network router
How to setup a wireless network routerHow to setup a wireless network router
How to setup a wireless network routerAnthonysshareslide
 
Manual wireless router cnet cwr 854
Manual wireless router cnet cwr 854Manual wireless router cnet cwr 854
Manual wireless router cnet cwr 854fgonzalez2005
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Configure router for wap (wireless access point
Configure router for wap (wireless access pointConfigure router for wap (wireless access point
Configure router for wap (wireless access pointsergio goco
 
D link router_setup_example
D link router_setup_exampleD link router_setup_example
D link router_setup_example97148881557
 
Types of interfaces in a Cisco Router
Types of interfaces in a Cisco RouterTypes of interfaces in a Cisco Router
Types of interfaces in a Cisco RouterNetProtocol Xpert
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpnjadeja dhanraj
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersNetProtocol Xpert
 
Man connaction
Man connactionMan connaction
Man connactionArjun Das
 
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...SaNju MuLak
 
TLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless RouterTLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless RouterRomne Ryan Portacion
 
Access list-cheatsheet
Access list-cheatsheetAccess list-cheatsheet
Access list-cheatsheetvannastart
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Dân Chơi
 

What's hot (20)

How to make a simple application on packet tracer
How to make a simple application on packet tracerHow to make a simple application on packet tracer
How to make a simple application on packet tracer
 
Ccna ppt
Ccna pptCcna ppt
Ccna ppt
 
Simple IPv4_Subnetting
Simple IPv4_SubnettingSimple IPv4_Subnetting
Simple IPv4_Subnetting
 
CCNA Icnd110 s04l02
CCNA Icnd110 s04l02CCNA Icnd110 s04l02
CCNA Icnd110 s04l02
 
How to setup a wireless network router
How to setup a wireless network routerHow to setup a wireless network router
How to setup a wireless network router
 
An Insight on Industrial 4G Routers
An Insight on Industrial 4G RoutersAn Insight on Industrial 4G Routers
An Insight on Industrial 4G Routers
 
Manual wireless router cnet cwr 854
Manual wireless router cnet cwr 854Manual wireless router cnet cwr 854
Manual wireless router cnet cwr 854
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Configure router for wap (wireless access point
Configure router for wap (wireless access pointConfigure router for wap (wireless access point
Configure router for wap (wireless access point
 
D link router_setup_example
D link router_setup_exampleD link router_setup_example
D link router_setup_example
 
Types of interfaces in a Cisco Router
Types of interfaces in a Cisco RouterTypes of interfaces in a Cisco Router
Types of interfaces in a Cisco Router
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & Answers
 
Man connaction
Man connactionMan connaction
Man connaction
 
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...
 
TLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless RouterTLE 10 (ICT): Configuring a Wireless Router
TLE 10 (ICT): Configuring a Wireless Router
 
Access list-cheatsheet
Access list-cheatsheetAccess list-cheatsheet
Access list-cheatsheet
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011
 

Viewers also liked

3Rs Explosives Safety Education Program Outreach Toolbox
3Rs Explosives Safety Education Program Outreach Toolbox3Rs Explosives Safety Education Program Outreach Toolbox
3Rs Explosives Safety Education Program Outreach ToolboxGeoffrey Carton
 
New Apec
New ApecNew Apec
New ApecMitsJr
 
2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…
2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…
2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…Geoffrey Carton
 
Characterization Of Explosives Contamination at Munitions Manufacturing Facil...
Characterization Of Explosives Contamination at Munitions Manufacturing Facil...Characterization Of Explosives Contamination at Munitions Manufacturing Facil...
Characterization Of Explosives Contamination at Munitions Manufacturing Facil...Geoffrey Carton
 
Sundrell
SundrellSundrell
SundrellMitsJr
 
2013 Ordnance Reef HI - webinar- wo prelim results
2013 Ordnance Reef HI - webinar- wo prelim results2013 Ordnance Reef HI - webinar- wo prelim results
2013 Ordnance Reef HI - webinar- wo prelim resultsGeoffrey Carton
 
2009 Historic Disposal of Military Munitions in US Coastal Waters
2009 Historic Disposal of Military Munitions in US Coastal Waters2009 Historic Disposal of Military Munitions in US Coastal Waters
2009 Historic Disposal of Military Munitions in US Coastal WatersGeoffrey Carton
 
Presentation power point2.
Presentation power point2.Presentation power point2.
Presentation power point2.Gerard Remo
 

Viewers also liked (9)

3Rs Explosives Safety Education Program Outreach Toolbox
3Rs Explosives Safety Education Program Outreach Toolbox3Rs Explosives Safety Education Program Outreach Toolbox
3Rs Explosives Safety Education Program Outreach Toolbox
 
New Apec
New ApecNew Apec
New Apec
 
Lan speeds
Lan speedsLan speeds
Lan speeds
 
2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…
2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…
2011 Perspective on DoD’s Efforts Relating to Legacy Underwater Military Munit…
 
Characterization Of Explosives Contamination at Munitions Manufacturing Facil...
Characterization Of Explosives Contamination at Munitions Manufacturing Facil...Characterization Of Explosives Contamination at Munitions Manufacturing Facil...
Characterization Of Explosives Contamination at Munitions Manufacturing Facil...
 
Sundrell
SundrellSundrell
Sundrell
 
2013 Ordnance Reef HI - webinar- wo prelim results
2013 Ordnance Reef HI - webinar- wo prelim results2013 Ordnance Reef HI - webinar- wo prelim results
2013 Ordnance Reef HI - webinar- wo prelim results
 
2009 Historic Disposal of Military Munitions in US Coastal Waters
2009 Historic Disposal of Military Munitions in US Coastal Waters2009 Historic Disposal of Military Munitions in US Coastal Waters
2009 Historic Disposal of Military Munitions in US Coastal Waters
 
Presentation power point2.
Presentation power point2.Presentation power point2.
Presentation power point2.
 

Similar to 8 Ways to Add Wireless Network Security

Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Securing home wifi 16 mar15
Securing home wifi 16 mar15Securing home wifi 16 mar15
Securing home wifi 16 mar15Naval OPSEC
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiAgreeta Sharma
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - EnglishAdhie Lesmana
 
Wireless networks 07
Wireless networks 07Wireless networks 07
Wireless networks 07Roohul Amin
 
Cognex In-Sight - Network Settings.pdf
Cognex In-Sight - Network Settings.pdfCognex In-Sight - Network Settings.pdf
Cognex In-Sight - Network Settings.pdfDiogoCampezatto
 
Networking Related
Networking RelatedNetworking Related
Networking RelatedZunAib Ali
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyahSeptafiansyah P
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalFisal Anwari
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsYaser Rahmati
 
All about routers
All about routersAll about routers
All about routersagwanna
 
Northridge Consulting Group Case Project
Northridge Consulting Group Case ProjectNorthridge Consulting Group Case Project
Northridge Consulting Group Case Projectedwardlong
 

Similar to 8 Ways to Add Wireless Network Security (20)

Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
Securing home wifi 16 mar15
Securing home wifi 16 mar15Securing home wifi 16 mar15
Securing home wifi 16 mar15
 
5 steps
5 steps5 steps
5 steps
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi Fi
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
 
Dasar komputer chapter8
Dasar komputer chapter8Dasar komputer chapter8
Dasar komputer chapter8
 
Wireless Router: This is how it Benefits
Wireless Router: This is how it BenefitsWireless Router: This is how it Benefits
Wireless Router: This is how it Benefits
 
Wireless networks 07
Wireless networks 07Wireless networks 07
Wireless networks 07
 
Cognex In-Sight - Network Settings.pdf
Cognex In-Sight - Network Settings.pdfCognex In-Sight - Network Settings.pdf
Cognex In-Sight - Network Settings.pdf
 
Networking Related
Networking RelatedNetworking Related
Networking Related
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyah
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
net work iTM3
net work iTM3net work iTM3
net work iTM3
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
Network
NetworkNetwork
Network
 
All about routers
All about routersAll about routers
All about routers
 
Northridge Consulting Group Case Project
Northridge Consulting Group Case ProjectNorthridge Consulting Group Case Project
Northridge Consulting Group Case Project
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

8 Ways to Add Wireless Network Security

  • 1. SMC Networks 8 Ways of adding security to your wireless network
  • 2. 1 Disable the Network Name (SSID) To make it easy for wireless receivers to find their transmitter, most wireless devices are configured by default to broadcast a beacon known as a Service Set Identifier (SSID). This SSID or network name can be changed to a private name and can also be hidden (not broadcasted). This way, only receivers that know the correct SSID will be able to connect to the wireless network.
  • 3. 2 MAC Address Filtering As a form of physical security, it is possible from the router to only allow specified networks users to access the wireless network by identifying their unique Ethernet MAC address associated with each network device. This gives a level of security similar to staff access cards and identification badges.
  • 4. 3 WEP/WPA/WPA2 These abbreviations refer to three different encryption standards that can be used to secure a wireless network: a) Wired Equivalent Privacy (WEP) is not considered secure anymore and should only be used with legacy equipment that does not support WPA/WPA2. b) WiFi Protected Access (WPA) offers a higher level of wireless security, making sure that the data will remain private and access to the network is restricted to authorized users. c) WPA2 has replaced WPA and uses a stronger encryption standard called Advanced Encryption Standard (AES).
  • 5. 4 IEEE802.1x The IEEE802.1x standard describes how to provide authentication and authorization using an authentication server that keeps usernames, passwords and user rights to access a network in a central database. This way, a wireless router/ access point will contact the authentication server first when a device wants to connect to the wireless network. The server checks the user credentials against the database and informs the wireless router/ access point if the relevant user is allowed to access the network or not, and what are the relevant user rights.
  • 6. 5 Disable DHCP Server Disabling the DHCP Server of a wireless router will stop it from automatically assigning IP addresses to new devices, including potential hackers. Instead, the network administrator has to configure new devices manually with valid IP address information.
  • 7. 6 IP Subnetting IP addresses and subnets in home wireless networks are normally configured so that 254 users can have a valid IP address. For example: Router IP: 192.168.2.1 Computer IPs: 192.168.2.2 to 192.168.2.254 Subnet Mask: 255.255.255.0 For additional security, the router could also be configured with a subnet that allows to assign 6 IP addresses only. For instance: Router IP: 192.168.2.1 Computer IP: 192.168.2.2 to 192.168.2.6 Subnet: 255.255.255.248 This way the maximum number of devices in the LAN is limited and external customer will need to know the subnet used in the network to be able to connect.
  • 8. 7 User name & password of router admin After being connected wireless or wired to the network, the admin interface of the router can normally be accessed by entering its IP address in a web browser. With the help of a username and a password, all router settings can be changed. In order to avoid an intruder to be able to login to the network router and make configuration changes in the network, it is recommended to change the username (if possible) and the password of the router admin web interface.
  • 9. 8 Change default IP address range The wireless routers normally are by default configured with an IP address like this 192.168.x.x (for SMC Networks Routers 192.168.2.1) If you are thinking in disabling the DHCP server so that the router will not assign IP addresses to devices, you might want as well to change the range of the IP addresses used in your whole network. For example: 10.0.x.x Router: 10.0.0.1 Other devices: 10.0.0.2-254 This way, possible intruders will not know the IP address range and it will be more difficult for them to get connected.
  • 10. For more technical documents visit us www.smc.com Disclaimer: All data has been carefully checked for correctness. SMC Networks takes no responsibility for possible errors in this document. All technical specifications are subject to change without prior notice. (c) 2010, SMC Networks