วันพุธที่ 10 กันยายน พ.ศ. 2551

Wireless Networking, Part 2: Setup and Security

The first installment in this two-part series of Tech Tips provided an introduction to basic skills and equipment involved in wireless networks. In the last chapter of this two-part series, we'll see some of the basic configuration and security considerations that should be taken into account. The physical installation of a wireless network may be easier than a cable network, but the hardest part is the creation of software and security to ensure that everything is still in place and working well. Although this technology is far from an exhaustive list of resources to set up a wireless network, providing information and references that can be used for the most typical installations. Many of these councils is sufficient in general, which can give some good advice for those using the cable network. For the sake of this article, we assume that the equipment is installed physically, and the user is willing to establish and secure software. The mobile devices, including routers / access points, usually a Web-based configuration tool that allows users to customize the equipment to meet their needs. The equipment will most probably work with a minimum configuration, but to work so that the integrity of the network is protected May take some measures. In addition to the configuration interface with the hardware wireless network, Microsoft has integrated a wireless network setup wizard with the launch of Windows XP Service Pack 2 will lead to a user through the installation of its network. In addition, the network banda anche utility Microsoft will help them monitor and maintain networks as easily once it is established. Change your password standard routers, whether by cable or wireless, require a password to enter the various parameters, and they come with very simple default passwords. The first step in creating the router should be to change the default password to something more difficult to guess. More passwords using a combination of letters and numbers is preferable, as it tries to hack much more difficult. Changing the IP address of the router Most routers come with a standard IP (Internet Protocol) address, which is 192.168.1.1, which is used by the user to access the utility configuration interface, and their own network for the negotiation of local area network and wide area connections. The configuration utility for most routers include a page that allows the default IP address to be changed manually by the user. Despite change the default IP address does not provide much security, because it can easily be detected, however, May interference deter local users who may be randomly scan the network. Setup router or access point used in the first part of this series of Tech Tips, I said that almost all routers for your home can also serve as wireless access points, which is usually done with the click a check box. If a wireless router is added to an existing network with a router and connect banda reed, the new device must be fixed as an access point. Otherwise, it might be a conflict that the network will not know where to expect the Internet connection, and now has two routers that would both serve as a bridge. If the wireless router is the replacement of a router, or is unique in the network, this should not be a problem, since these devices usually ships in place to act as a router by default. The SSID broadcasting SSID or Service Set Identifier, in principle, is the name given to a wireless network. The user can choose virtually any name they want, regardless of the venue and date of less than 32 characters long, and they need to ensure that all networked computers are being place to use the same name. Two measures on the SSID can be taken to improve network security: First, change the default SSID to a name which contains a unique combination of letters and figures that reveal nothing personal about you or your network. Second, turn off the SSID broadcast time that all computers are connected with success, even if your router / access point is recommended broadcasting. I spent a few wireless routers, and they all have a check box to enable / disable the SSID broadcast, and each recommended stop broadcasting activated. The SSID broadcasting to provide new computers to easily find your network, so all you have to do is to get access to it has the right credentials. Broadcasting your SSID put there for everyone within the limits of seeing, and which only allows potential hackers to get a step closer to compromise their security. In a home environment, it is probably a few computers that need access to the network, and if others are added each time, he temporarily allowed May to settle the problem. DHCP Server DHCP (Dynamic Host Configuration Protocol) server is a feature of most routers that will allow you to add new computers extremely simple. When a new computer is connected to the network, the router will assign an IP address to it, rather than the user having to manually assign an IP address each while sitting at the computer. This allows the network configuration very easy, but also makes the network vulnerable, like any new computer detected will be welcome in the district and assigned an IP address automatically. Two different approaches can be taken to improve security in connection with the DHCP server: A method and the best in regard to security, is to disable the DHCP server. This will require that all computers that are authorized to connect to the network can be adjusted manually, but it will prevent the purchase of computers from an IP address. The second method, which does not offer security spheres, is better than doing nothing. Typically, a DHCP server can support up to 250 computers, and by default, leaving behind a number of addresses available for many to connect. If you turn off the DHCP server does not seem appropriate for a user, May restricts the DHCP server only offers the largest number of IP addresses, because they know they need. If you know it will never be more than five computers that are linked together, narrow the range of IP addresses available, for a total of five in the Setup Utility. Different levels of wireless encryption of all components support any form of encryption, which simply codifies the information sent over the network so it could not be easily read by others connected to the network. There are different types and levels of encryption, and a brief overview is given below: WEP, or wireless protocol equivalence was the first form of encryption on wireless networks. WEP allows the network administrator to assign a chain of encryption that must be shared by all computers are authorized to access the wireless network. WEP encryption is either through 64 bits, 128 bits, 256bit, which represents the largest number of major codification, and the strings can be generated by the administrator as a series of numbers and letters. WPA, or Wi-Fi Protected Access, is an improvement over WEP beginning with the same chain of encryption and math teachers followed by encryption keys in order to maintain security dynamic. WPA constantly changing encryption keys that are used for each package, and because of additional treatment is needed to support the protocol, the overall performance of the connection May suffer a little. Despite the potential reduction of speed, WPA is considered far more robust than WEP, and should be used whenever possible. In some cases, WEP, indeed, have been defeated, WPA make it more attractive. Although most components of the support of these two encoding formats, and users can choose the type you want from the program, not all. All network devices should be established to operate the same level of encryption, May means that some units to force others to be less sure of what they are capable of. For example, a wireless network around this configuration of the router (http://www.geeks.com/details.asp?invtid=DI-824VUP&cat=NET) could support either WEP or WPA encryption. When two teams have been added to the network using one of these network adapter (http://www.geeks.com/details.asp?invtid=WN-4054P&cat=NET) in one case and one of those network adapter (http : / / Www.geeks.com / details.asp? Invtid = PBW006-N & cat = NET) in other cases, things have changed. Please note that the second card is not compatible with WPA, so that the entire network must be configured to use WEP to accommodate it. Router position as will be seen in the first part of the Technical Bureau, May wireless devices have a maximum range of a few hundred metres of space. Once installed in a house, this sector can reduce largely because of walls, floors and other obstacles, but the signal can still be strong enough to carry beyond the limits of housing. A simple measures that can help reduce the strength and extent of the network signal outside the house, the position router / access point closest to the heart of the house as possible. The possibility that someone detect the network out of home when they are placed if it is now much less than if the router has been placed near a window, for example. The last words are certainly other issues that might be considered when creating a wireless network, but coverage of these basic concepts will be much more secure, wireless network that was directly from the box. Many hope that nobody would be interested in a home network and feel the environment is only one head of the technical Mumbo-jumbo who prefer not to try. The fact that a hacker would have access to personal files on the network, or simply to gain unauthorized access to the Internet, some simple measures that are worth the peace of mind that you are as safe as possible. Jason Kohrs
http://www.geeks.com Computer Geeks http://www.geeks.com/pix/techtips.htm Technical advice and http://www.geeks.com/pix/techtips.htm computer.

ไม่มีความคิดเห็น: