05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

15-34 Chapter 15 Configuring Network and Internet Connections<br />

One of the biggest threats to wireless networks is that operating systems such as Windows<br />

XP Professional make it very easy to locate and connect to wireless networks—<br />

so easy, in fact, that people often connect to unsecured wireless networks without<br />

even realizing that it has happened. There are also more deliberate threats to wireless<br />

networks. Attackers can gain access to unsecured (or improperly secured) networks by<br />

connecting with their wireless stations, or even by installing unauthorized APs on an<br />

existing wired network. Once connected, attackers can inspect, modify, or damage<br />

vital resources.<br />

Fortunately, there are a number of ways to secure a wireless network against such<br />

threats. These methods are the focus of the next few sections.<br />

MAC Address Filtering<br />

A very basic way to protect an infrastructure wireless network is to implement media<br />

access control (MAC) filtering. Every network adapter (wireless network adapters<br />

included) contains an address known as a MAC address. An administrator can configure<br />

an AP so that it accepts communications only from specified MAC addresses.<br />

Although MAC filtering does offer some level of protection from casual intrusion, it is<br />

far from useful as a single security solution. Following are some concerns about using<br />

MAC filtering:<br />

■ It is relatively easy to spoof a MAC address. Many software products exist that let<br />

an intruder modify the MAC address on a wireless network adapter.<br />

■ Most APs require that you manually enter MAC addresses. For networks with large<br />

numbers of wireless clients, this means a lot of work for administrators. In addition,<br />

most APs have a limit to the number of MAC addresses you can authorize.<br />

■ MAC filtering can stop an unauthorized computer, but not an unauthorized user. If<br />

an intruder gains access to a computer that has an approved MAC address, the<br />

intruder can gain access to the wireless network.<br />

Service Set Identifier (SSID) Broadcasting<br />

Every infrastructure network is named with a service set identifier (SSID). This name<br />

distinguishes the network from other wireless networks. By default, most APs broadcast<br />

their SSID so that wireless clients can easily locate and connect to the network.<br />

SSID broadcasting provides a great deal of convenience because wireless clients (especially<br />

those that roam among different wireless networks) can easily detect networks<br />

without requiring much configuration from the user.<br />

You can disable SSID broadcasting on most APs, which can prevent casual intruders<br />

from discovering a network. However, intruders who are looking for your network will<br />

likely be able to find it anyway. Several software programs exist that can scan for wireless<br />

networks and identify the SSID of a network, even if SSID broadcasting is disabled.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!