Wireless LAN Security

Because wireless networks transmit data through the air it’s essential to defend against unknown devices and clients trying to access your network.  We all know how important data protection is in this day and age, so it’s imperative to equip your wireless network with the hardware and software that will keep your data safe.  The Motorola White Paper, Enterprise Wireless LAN Security provides great tips on how to secure your wireless network.  This is just a summary list that provides some of the best practices to keep your network safe. For more information on specific products that you can implement in your network, you can read the entire Motorola White Paper at Enterprise Wireless LAN Security

  • Wireless Firewall: Firewalls block unauthorized traffic, while allowing authorized traffic to access your network. They prevent unauthorized Internet users from accessing your private network by blocking users who don’t meet defined security criteria.
  • WPA2 (WiFi Protected Access 2): WPA2 was developed after weaknesses were identified with WEP (Wired Equivalent Privacy), the standard for wireless LAN security. WPA2 is the 2nd generation of WPA security that provides the assurance that only authorized users will have access to your network. WPA2 uses the AES (Advanced Encryption Standard) and is said to be more secure than a wired network.
  • NAC (Network Access Control): NAC’s block or quarantine devices that are non-compliant and also ensure that security measures such as antivirus software and firewall are properly enabled.
  • Rouge Device Detection: In an enterprise network with thousands of assets, it’s always a good idea to have an up to date asset inventory and a network map. This will minimize the chance of a rouge device remaining undetected for very long. All new devices should be required to follow the same steps when joining the network so they can be added to the asset inventory and the network map. But for those devices that slip by, and they will, it’s essential to run periodic scans of your network.