Please enable JavaScript.
Coggle requires JavaScript to display documents.
CONFIGURE WIRELESS SECURITY MODES (WIreless Access (Wi-Fi Protected Access…
CONFIGURE WIRELESS SECURITY MODES
WIreless Access
Wi-Fi Protected Access (WPA)
improved version of WEP,WPA covers the entire 802.11i standard
stronger encryption than WEP encryption
Wi-Fi Protected Access (WPA2)
improved version of WPA
introduces higher levels than WPA
support robust encryption
Wireless Antennae
avoid transmitting signal outside of the network area by installing an antenna with a pattern that serves your network users
Wired Equivalent Privacy (WEP)
first generation security standard for wireless
attackers quickly discovered thst WEP encryption was easy to break
Network Device Access
have the same username and password for accessing the wireless configuration
unauthorized users an easily log on to the access point and modify the setting
Wi-Fi Protected Setup (WPS)
developed to help people set up a wireless network quickly, easily and security enabled
most common way for a user to connect the PIN method
developed than can intercept traffic
recover the WPS PIN and the pre-shared encryption key
Hardware Firewall
physical filtering component that inspects data packet from the network before they reach computers and other devices on a network
2 different type of traffic into network
responses to traffic that originates from inside your network
traffic destined fpr a port that you have intentionally left open
Comparision Between Hardware and Software
Hardware Firewall
dedicated hardware component
multiple computer can be protected
no impact on computer performance
Software Firewall
available as third-party software cost varies
typically protects only the computer on which it is installed
uses the CPU potential impact on computer performance
Type of hardware firewall configurations
packet filter
stateful packet inspection
application layer
proxy
Application Layer
all packet travelling to or from an application are intercepted
Stateful Packet Inspection
keeps track of the state of network connections traveling through the firewall
Proxy
a proxy server is a server that is a relay between a client and a destination server on the internet
Packet Filter
cannot pass through the firewall
unless match the established rule set configured
traffic can be filtered based on different attributes
such as source IP address
Demilitarized Zone
a subnetwork that provides services to an untrusted network
protects the internal network from attacks by this traffic
does not protect the servers in the DMZ in any way
Port Forwarding and Port Triggering
Port Forwarding
-
is a rule based method fo directing traffic between devices on separate network
router determines if the traffic should be forwarded to a certain device based on the port number found with the traffic
Example : HTTP - Port 80
Port Triggering
allows the router to temporarily forward data through inbound ports to a specific device