Securing The Wireless Soho Network Essay

896 words - 4 pages

Installing and getting a Small Office Home Office (SOHO) network set up is a simple task when using “Off The Shelf” equipment and the default configuration. Sadly it is not as secure as one would like. Using the default configuration leaves the network open to would be hackers, hijackers and the next door neighbor looking to get some free internet.
Today we are going to discuss the equipment used to build our SOHO and then how to step outside of the box and ensuring that we are secure. Our small businesses has a total of 5 employees working out of a converted basement. We use Verizon FIOS for our ISP using a Actiontec Wireless Broadband Router (GigE), 5 laptops, 1 PC and 1 ...view middle of the document...

168.0.1 all other IPs are assigned by DHCP. WEP is set for encryption and the transmit power is set to high.
New security configuration
After setting up the network and ensuring that all user stations were able to connect with the network in its default state we will implement our security policy. First and foremost is the reconfiguring of the network itself. Our goal is to make the network secure while still allowing for our systems to connect and be productive. The first step would be to connect to the router using the default user name and password. Once connected the username will be changed to something other than “Admin” and the password will be changed to a more complex password using at least 9 characters and most include Upper Case, lower case letters, numbers and special characters (!#$^* for example).
The SSID will be changed from the default to one that is more fitting for our network while at the same time the SSID will no longer be broadcasted. This will help keep prying eyes that are searching for our network from finding it listed in the list of available networks in the area. The transmit power that is set to high by default will be lowered to the point that only out furthest asset from the router will be able to see it.
DHCP will be turned off and static IPs will be assigned to each asset using the IP Schema of 10.0.0.x over the standard 192.168.0.x addresses. We will also tune on MAC address filtering. Each of our assets MAC addresses will be recorded and then entered into the filtering on the router. This will make it so only the...

Other Papers Like Securing the Wireless Soho Network

Network Design Essay

1178 words - 5 pages , 2012). "Star Topology Advantages and Disadvantages" [pic] (no copyright date provided). "What is network architecture?" Gary Kessler. (2000). " Cable Modems and the Internet: Securing the SOHO " QuinStreet Inc. (Copyright 2012). " full-duplex

Local and Wide Area Networks Essay

1273 words - 6 pages in securing the clients on the network. Windows Firewall provides two way traffic filtering based on application type, port number, IP address and origin point (Microsoft, 2012). Additionally, Windows Firewall settings can also be deployed and enforced via Active Directory based group policy (Microsoft, 2012). This will ensure that settings are consistent across all Active Directory based clients and will minimize configuration time (Microsoft

Itm425: Introduction to Computing

1326 words - 6 pages basic wireless network, you will need a network card/adapter, a wireless router, and access points. The network card is the most important hardware component of wireless networking. The wireless router and access points are used to increase performance, accommodate more computers, and increase the network’s range. Network adapters are used to interface a computer to a network. They can be found as a traditional PCI card, PC Card adapter, USB

Monitor Critical It Environments With A Rack Mounted Network Camera

705 words - 3 pages PARTNER SOLUTION NOTE Monitor critical IT environments with a rack mounted network camera. Physically securing your business is just as important as virtually securing the information it holds. Network video cameras allow you to monitor physical access to critical IT environments, where strict data compliances apply. These controls can help identify individuals that physically access areas storing critical organizational and customer

Unit 5 Lab 1

1058 words - 5 pages Wired and Wireless Networks ITT Technical Institute Physical Networking – NT1310 11/10/2014 Wired and Wireless Networks The biggest difference between these two types of networks is one uses network cables and one uses radio frequencies. A wired network allows for a faster and more secure connection and can only be used for distances shorter than 2,000 feet. Several other disadvantage of a wired network such as the “need to run cables in

Wlan Security

518 words - 3 pages network. There are two other methods of increasing network security which are more obscure, yet still play an important role in the security of a WLAN. Ensure that the management ports are secure by way of a centralized port management. This is especially important in a large network. Hiding and securing access points play an important role in securing a WLAN. The consequences for a business not layering security on its’ WLAN can be denial of access

My Home Network

650 words - 3 pages categories based upon the performance namely LAN, MAN and WAN. For our home purpose generally we use LAN technology. Local Area Network can up to a building and it can be either in Wired or in Wireless. For Wired Technology we use Ethernet Cables along with the Router, Switch, Hub and for Wireless WI-FI and Bluetooth technologies are widely using. My Network: We use Verizon as ISP that provide signal to my home network. Verizon gives a

Wireless Network

2018 words - 9 pages Wireless network Introduction Wireless mobile computing solutions adoption has been of benefit to government institutions and learning institutions among others. This is as a result of higher customer satisfaction and higher productivity. Wireless network is a computer network which is not connected by any cable. This assists business enterprises and organizations to avoid cabling value in a building. The network is implemented by use of

It/241 Week 5 Site Survey Benefits

557 words - 3 pages The manager wants a wireless network installed in her office, as a network administrator is very simple to do this types of installation just by putting a Wi-Fi router in the office turning the transmitter to a lower setting and making sure that you have connectivity. A site survey in a medium or large business required more physical work and time, a proper site survey interview should occur to both educate the customer and properly determine

Wireless Networks

546 words - 3 pages Wireless networks More and more traffic is moving over to wireless technology every year. The converging network between voice and data on the data network was an innovative idea. Now, networks in the business field are taking a whole new twist on converged networks. They added a new twist to it, now you can have a converged network using a wireless connection. Having the ability to be able to be mobile and conduct business has been an

Mobile Computing in the Health Industry

1107 words - 5 pages servers. Another method of providing protection to an organizations network via wireless technology is through the use of MAC address filtering. Access points come with a built in feature that could allow the administrator to configure which devices can have access to the network based on the physical address of the device. These methods gave more flexibility to the network administrator in delegating control of network resources to authenticated

Related Essays

Prolonging The Lifetime Of Wireless Sensor Network

1999 words - 8 pages INTRODUCTION Wireless Sensor Networks (WSNs) are distributed embedded systems composed of a large number of low- cost, low-power, multifunctional sensor nodes. The sensor nodes are small in size and communicate wirelessly in short distances. These tiny sensor nodes can perform sensing, data processing and communicating. They are densely deployed in the desired environment. A sensor network consists of multiple detection stations called

Comparing Soho Hardware Firewalls Essay

811 words - 4 pages Comparing SOHO Hardware Firewalls Routers As more and more individuals start their own small home businesses and technology is becoming a major part of these businesses, it is just as important that they are able to secure their network from attacks the same as enterprises-level businesses. According to Whitman & Mattord (2011), one of the most effective methods of improving computer security in the Small Office/Home Office (SOHO) setting

Network Plus Essay

1396 words - 6 pages same as a neighboring company b) Change the wireless encryption type to WEP c) Remove the antennas d) Check neighboring offices for connectivity and reduce the signal strength appropriately Question 18. Objective: Given a scenario and a set of requirements, plan and implement a basic SOHO network. An administrator is asked to set up a home office for a user who would like to connect to the Internet and share files with all six computers

Finance For Christiana Essay

609 words - 3 pages A wireless local area network (WLAN) is a wireless machine organize that connections two or more gadgets utilizing a wireless dispersion system (regularly spread-range or OFDM radio) inside a constrained region, for example, a home, school, machine research centre, or office building. This gives clients the capacity to move around inside a nearby scope zone & still be joined with the system, & can give an association with the more