Cisco WIRELESS ACCESS POINT WAP4410N Instrukcja Użytkownika Strona 11

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 10
Planning Your Wireless Network
Protecting Your Network
WAP4410N Wireless-N Access Point with Power Over Internet Administration Guide 11
2
Protecting Your Network
Wireless networks are easy to find. Hackers know that to join a wireless network,
wireless networking products first listen for “beacon messages.” These messages
can be easily decrypted and contain much of the networks information, such as
the networks SSID (Service Set Identifier).
Here are steps you can take to protect your network:
Change the administrator’s password regularly
Every wireless networking device stores network settings (for example, SSID and
WEP keys) in its firmware.
Your network administrator is the only person who can change network settings. If
a hacker discovers the administrator’s password, then the hacker too can change
those settings.
Protect your SSID
Disable SSID broadcasting. Most wireless networking devices give you the
option of broadcasting the SSID. While this option may be more convenient,
it allows anyone to log into your wireless network. This includes hackers.
So, don’t broadcast the SSID.
Make the SSID unique. Wireless networking products come with a default
SSID set by the factory. Hackers know these defaults and can check them
against your network. Change your SSID to something unique and not
something related to your company or the networking products you use.
Change the SSID often. Change your SSID regularly so that hackers who
gain access to your wireless network will have to begin again.
Enable MAC Address Filtering
MAC address filtering allows you to provide access to only those wireless nodes
with certain MAC addresses. Filtering makes it harder for a hacker to access your
network with a random MAC address.
Secure Your Network
WEPWEP is often looked upon as a cure-all for wireless security
concerns. This is overstating WEP’s ability. Again, this can only provide
enough security to make a hackers job more difficult.
There are several ways that WEP can be maximized:
- Use the highest level of encryption possible.
Przeglądanie stron 10
1 2 ... 6 7 8 9 10 11 12 13 14 15 16 ... 61 62

Komentarze do niniejszej Instrukcji

Brak uwag