2. • With Wireless Networking, no cables or wires
are needed to network your computers and
share your Internet connection.
• WLANs offer a quick and effective extension
of a wired network or standard LAN.
• With a simple access point attached to the
wired network, personal computers, laptops,
handheld devices, printers, and other network
devices can connect with the wired network at
broadband speeds.
3. ACCESS POINT
BRIDGE
NIC
ANTENNA
AAA SERVER
NMS SERVER
4. Anyone within the geographical network
range of an open, unencrypted wireless
network can 'sniff' or record the traffic, gain
unauthorized access to internal network
resources as well as to the internet.
If router security is not activated or if the
owner deactivates it for convenience, it
creates a free hotspot.
5. Rogue WLANs:-Unauthorized, “rogue” wireless
LANs are clearly a foreseeable internal risk to the
security, confidentiality, and integrity of customer
information.
Insecure WLANs:-Insecure wireless LANs are a
recognized security risk. While wireless LANs are
often deployed for their productivity benefits,
security is often an afterthought.
WLAN Policy violation:-WLAN policy violations
are a recognized internal risk to the security,
confidentiality, and integrity of customer
information.
6. Network Eavesdropping:-Because wireless
communication is broadcast over radio waves,
eavesdroppers who merely listen to the airwaves
can easily pick up unencrypted messages.
Additionally, messages encrypted with the Wired
Equivalent Privacy (WEP) security protocol.
Theft of WLAN credentials:-The theft of an
authorized WLAN user’s identity poses one the
greatest threats. Service Set Identifiers (SSIDs) that
act as crude passwords and Media Access Control
(MAC) addresses that act as personal identification
numbers are often used to verify that clients are
authorized to connect with an access point.
8. There are three principle ways to secure a
wireless lan .
1.) For closed networks (home users and
organization)configure access restrictions in
the access points.
2.) For commercial providers it should to be
isolated wireless network.
3.) End to end encryption.
9.
10. Establish wireless LAN security policies.
Design for security.
Logically separate internal networks.
Enable VPN access only.
Remove unnecessary protocols.
Restrict AP connections.
Protect wireless devices.
11. A WLAN has some specific advantages:
It is easier to add or move workstations.
It is easier to provide connectivity in areas where it
is difficult to lay cable.
Installation is fast and easy, and it can eliminate
the need to pull cable through walls and ceilings.
Access to the network can be from anywhere within
range of an access point.
Portable or semi permanent buildings can be
connected using a WLAN.
12. WLANs also have some disadvantages:
As the number of computers using the network
increases, the data transfer rate to each computer will
decrease accordingly.
As standards change, it may be necessary to replace
wireless cards and/or access points.
Lower wireless bandwidth means some applications
such as video streaming will be more effective on a
wired LAN.
Security is more difficult to guarantee and requires
configuration.
Devices will only operate at a limited distance from an
access point.
13. Like most advances, wireless LANs poses
both opportunities and risks. The technology
can represent a powerful complement to an
organization’s networking capabilities,
enabling increased employee productivity and
reducing IT costs.