Have to Mobile Resistance, simple installation, high flexibility and scalability, as an extension of traditional wired networks, in many special environment has been widely used. With the wireless data network solutions has introduced, "whether you are at any time, anywhere can easily access," that goal was easily achieved. As wireless local area network as a carrier of electromagnetic waves by the public, any person who has a condition eavesdropping or interference information, and therefore the behavior of unauthorized access and eavesdropping more difficult to prepare. In 2001, a hacker conference in Las Vegas, security experts point out that wireless networks will become another piece of land of hacker attacks. General hacking tool box Package Including a computer with a wireless network card and a wireless network card detection software known as Netstumbler (download). Therefore, we at the beginning of wireless networks, it should give full consideration to their safety. Common wireless Network Security Technology are the following: Service Set Identifier (SSID) Through multiple wireless access points AP (AccessPoint) to set a different SSID, the wireless station and asked to produce the correct SSID to access the AP, so that you can allow different groups of users to access, and resources access permissions to different restrictions. So that the SSID is a simple password, providing some security, but if the field configuration AP Broadcasting Its SSID, then the safety will decline. As the general case, the user's own client system configuration, so many people know the SSID, it is easy for unauthorized users to share. Some manufacturers now support "to any (ANY)" SSID way, as long as the wireless station in range of any AP, the client will automatically connect to the AP, it will skip the SSID security. Physical Address Filter (MAC) Workstation as each wireless network card has a unique physical address, so you can manually maintain a set of AP allows access to the MAC address list, to achieve physical address filtering. This program requires a list of AP's MAC address must be updated, scalability is poor; and MAC addresses can be forged, in theory, it is also lower-level certification authority. Physical Address filtering is hardware certification, rather than user authentication. This approach requires the MAC address of AP in the list must be updated, are currently manual; if the user increases, scalability is poor, it is only suitable for small network size. Connection Equivalent Privacy (WEP) Link layer in the RC4 symmetric encryption, the user's encryption key to key with the same AP will be permitted to access network resources, thus preventing eavesdropping and unauthorized users access to unauthorized users. WEP provides 40-bit (sometimes called 64-bit) and 128-bit length key mechanism, but it still has many defects, such as a service area for all users share the same key, a user will lose the key the entire network insecure. And 40-bit key in today's very easy to crack; key is static, to manual maintenance, expansion and processing. Now to improve security, recommended 128-bit encryption key. Wi-Fi Protected Access (W PA ) WPA (Wi-Fi ProtectedAccess) is inherited yet solved the basic principles of WEP WEP weaknesses of a new technology. A result of increased algorithm for generating the encryption key, so even if the group gathered information and its parsing, it is almost impossible to calculate General Key. The principle of the common key basis, with that Computer MAC address and packet sequence number of the number of information were generated for each packet of information in different keys. Then with the same WEP key for the RC4 encryption this. With this treatment, all clients of all packet data exchanged information by the encryption key is not made of the same. No matter how much such data collected, in order to break out of the original common key is almost impossible. WPA is also an additional way to prevent data tampering and authentication features. As with these features, WEP has been criticized in the previous shortcomings of all the solution. WPA is not only a more powerful encryption than WEP methods, but also more rich in substance. As a subset of 802.11i standard, WPA includes authentication, encryption and data integrity check of the three components, is a complete security plan. National standards ( WAPI ) WAPI (WLAN Authenticationand PrivacyInfrastructure), the WLAN Authentication and Privacy Infrastructure, which is against the IEEE802.11 protocol in WEP security, wireless local area network in China, raised the national standard GB15629.11 WLAN security solutions . At the same time the program has been ISO / IEC authorized agencies IEEERegistrationAuthority review and recognition. Its main feature is the use of certificates based on public key cryptography system, truly a mobile terminal (MT) and the wireless access point (AP) between the two-way identification. Users only need to install a certificate can be in different areas covered by WLAN, roaming, user-friendly. Technology is compatible with the existing billing services, billing can be achieved on time, according to traffic accounting, billing and other monthly. AP set up the certificate, no longer on the back of the AAA Server Set, installation, network convenient, easy expansion to meet the families, businesses, Operation Business models and other applications. Port Access Control (802.1x) The technology is also used for wireless local area network of an enhanced network security solutions. When the wireless station STA associated with the wireless access point AP, the AP's service can use 802.1x authentication depends on the results. If certified, the AP for the STA to open the logical port, or not allow users to access. Required to install 802.1x 802.1x wireless workstation client software embedded in wireless access point to 802.1x authentication proxy, and also as a Radius client, the user authentication information transmitted to the Radius server. In addition to 802.1x port access control, but also provides user-based authentication and billing system, particularly suitable for public wireless access solution. Wireless LAN security measures 1, using port access technology (802.1x) to control and prevent illegal access and unauthorized access. 2, using 128-bit WEP encryption, does not use the manufacturer's own WEP key. <B I am an expert from healthy-e-cigarette.com, while we provides the quality product, such as Health Cigarette Lady Pipe Manufacturer , E Cigarette Accessories Manufacturer, Pcc Electronic Cigarette,and more.
Related Articles -
Health Cigarette Lady Pipe Manufacturer, E Cigarette Accessories Manufacturer,
|