Building A Secure WiFi Network

Part 1. Little about the security vulnerabilities of wireless networks cause lies in the principle of their work: to intercept data transmitted over the air, much easier than with conventional cable connection. It does not require expensive equipment and achievable using a conventional laptop, a pair of hacking tools (such as airodump and aircrack) and good instructions on hacking wi-fi (for example). Therefore, the wireless network should be as protected from the various kind of attacks: unauthorized connections, traffic interception and listening, theft of important information, 'false' access points, etc. To date, the most reliable wireless network is recognized security standard wpa (Wi-Fi Protected Access). Primary protection wi-fi network can be achieved through the mode WPA-PSK (Pre-Shared Key), when the access point and the computer user to manually enter the session key – Pre-Shared Key, reminiscent of the usual password. The potential vulnerability of WPA-PSK arises from the fact that in real networks, the key phrase is rarely changed and the same for all users. If time permits, and a powerful computer to select a password in the cellar.

Better protection network is achieved when using wpa Enterprise, which is installed in the network authentication server (RADIUS server), performs verification of user access rights. In this case, the wireless access point will block all connect to a wireless network up until entered by the user name and password to be checked for authentication server. If the user does not have a database of radius server, it can not connect to wi-fi network.