--%>

General LAN Security setup

General LAN Security setup: There are certain methods which can be used as general security such as not connecting the wireless network directly to SAMS network. The SSID should be changes on regular basis. After installation of the network the default SSID should be changed immediately. It should also be instructed within the users of the wireless network not to use the default ID at all. When wireless network is not in use, the SSID should be switched off so as to avoid unauthorized usage. The users should also change the SSID on a regular basis. The network should be wired equivalent privacy enabled. In this also the user should never use the default WEP. The WEP key should also be changes from time to time to ensure more security. The wireless network users should use MAC filtering if it is supported by their Wireless LAN. The password set for the administrator should also be changed from time to time. When the access point is not put to use, it should be switched off for a considerable amount of time so as to make it more secure and avoid unauthorized access. The user should update the access point to the firmware time to time. The wireless network should not be connected to the wired network hubs as it makes it prone to unauthorized access. For wireless LAN clients, static IP address should be used. This is because with the usage of DHCP (dynamic host configuration protocol) the attackers can get applicable IP address for entering the wireless network. Therefore Dynamic host configuration should not be used to assign IP to the wireless LAN. The company should make the inventory of all IP addresses for both the access point and the client. This would help the company to take a note of the authorized IP addresses. The IP address should be scanned and audited so as to avoid unauthorized access from attackers. The wireless network should secure its WLAN equipment by not using notebooks in a wireless network.

   Related Questions in Computer Network Security

  • Q : Explain Kerberos Explain the term

    Explain the term Kerberos.

  • Q : Define Google click fraud Google click

    Google click fraud: It is a type of internet crime which occurs in pay per click online advertising while a person, automated script, or computer program imitates legitimate user of any web browser clicking on an ad, for producing a charge per click w

  • Q : Cloud computingb security syntheses +20

    syntheses +20 paper +5 figures starting from introduction until conclusion

  • Q : What is Shift Rows Explain the term

    Explain the term Shift Rows.

  • Q : Secure a network perimeter How can you

    How can you secure a network perimeter? Be ensure to discuss all three of the basic access points into most networks, as well as the different types of firewalls commonly used today.

  • Q : Security Requirements and Attacks

    Explain the term Security Requirements and Attacks in network security.

  • Q : General LAN Security setup General LAN

    General LAN Security setup: There are certain methods which can be used as general security such as not connecting the wireless network directly to SAMS network. The SSID should be changes on regular basis. After installation of the network the defaul

  • Q : Wireless Antennas with significance

    Explain the term Wireless Antennas with significance?

  • Q : Explain LAN security in an Organization

    Introduction: The companies are able to deploy wireless LAN easily as the communication mode is wireless and hence no physical cables are put to use and drawing physical cable throughout the building incurs more time as compared to wireless LAN. With

  • Q : Security and Recovery in networking

    Security and Recovery: While dealing with network security and information security audit, there are many small but critical things which plays very significant role and need to handle very carefully. Subsequent to the last security audit, it is essen