Discuss about the Implementation of Secure Enterprise Wireless Network.
The report is developed for designing and implementation of a secure wireless enterprise wireless network for an organization. The network solution is developed after a detailed analysis on the current technology that can be applied for maintaining the confidentiality of the organization. The settings that should be made on the networking device should be analysed for securing the network from the unknown sources. The main areas that should be covered for the enterprise is demonstrated using the network design created for the enterprise. For maintaining the security of the network the server is configured with AES encryption protocol and authorization, authentication, integrity and network intrusion is prevented for the management of the network. The security of the wireless network is the main factor for the success of the network and for enabling remote connection the RADIUS server should be configured with the appropriate settings.
The confidential information of the enterprise should be kept secured and the wireless local area network should be secured with the application of encryption algorithm such as WPA2 for improvement of the security of the organization. An analysis is made on the ethical implication for the installation of the network device in different location of the workplace area and documented in the report. A design of the enterprise wireless network is also given in the report for the identification of the network topology used for the development of the network. For the analysis of the network a social analysis is done and the users are involved in the analysis for the identification of the needs of the wireless framework. The proposed action that is taken for designing the network should be evaluated for finding its consequences for deployment of the network device in different location of the network. The radiations emitted from the network device and the standards maintained for deployment of the new device should be analysed for the management of the network and removal of the constraint to develop the network framework. For testing the network a penetration testing should be used and it can cause violation of the trust issues of the organization.
The details of the testing team should be documented for the management of the network information and maintaining the confidentiality of the data. The different acts such as computer misuse act 1990, data protection act 1998 should be evaluated for the protection of the data and policy of the organisation. The router configuration used for connecting the different departments of the organization and securing the wireless network should be kept protected and the computer misuse act helps in implementation of a legislative control on the network for reducing the frauds and illegal access of the network. The application of the act causes the unauthorised access of the network to be considered as criminal activity.
The wireless network is designed using three cisco 2811 series router and each of the router are connected with each other for increasing the redundancy in the path for sending and receiving the data packets in the network. The router 1 is connected with two local servers that are used for storing the information of the organization and management of the information system. The Router 2 is connected with a switch for the management of the local distribution and connecting the different hosts in the network. The wireless access point is also connected with the distribution switch. Two different vlans are created for connecting the wireless hosts and the pcs and increase the security of the network. The wireless access points are configured with the application of security encryption for restricting the unknown users to connect with the wireless network of the organization and keep the network secure from illegal agents. The routers are interconnected with each other suing serial connection such that the connection is stable and The two access point deployed in the network are kept in the same VLAN. The Router 3 is also connected with a switch for the management of the distribution of the network. An analysis should be made on the number of users and the area of coverage of the wireless network for the installation of the access point in different location of the network. For enabling the VPN and the remote connection with the user the server 2 is configured as a RADIUS server and username and password is set for the management of the remote users. The password management is important for the maintaining the identity of the user and record the details of the user for allowing them to access the sensitive information of the enterprise network solution. The router 1 should also be configured with IPSEC protocol and Windows server 2012 R2 should be used as a RADIUS server configuration with the management of the authentication service and configuring the active directory service. The router should also be configured with the firewall policy such that the unknown IP address and the data packets can be blocked to reach the server. The channel used for the transmission of the VPN traffic is also encrypted for the increasing the security of the network framework.
The user should be authorised for accessing the wireless network and the configuration choices should be given to the user such that the records of the user using the wireless network is kept. The user should be managed with controlling the encryption and development of a user access policy for the personal and corporate device provided to the employees. A user access policy should be created and the use of third party tools for the automation of the client provisioning and integration of the wireless access control with the other network access control. The guests connecting to the wireless network should be redirected to a page accepting the user access policy for securing the company equipment. The creation of the VLAN and running antivirus program can help in controlling the wireless network device. The embedded wireless device on the WLAN can be managed with the use of pre shared WPA 2 and AES encryption.
Different types of authentication techniques such as open system authentication, MAC based access control can be implemented for allowing the network device to connect with the wireless network solution. The open mode is used when guests are needed to connect with the wireless network for increasing the efficiency of the work and management of the network resources according to the business policy of the organization. The Mac based access control is used for a closed network where the registered device can only connect with the wireless network for sending and receiving the data packets. The Pre shared keys can also be an alternate solution for the authentication of the user using the wireless network where the pass key is provided to the user to connect with the WLAN and the strong encryption is used for the management of the authentication of the user.
The integration of the mobile information is essential for eliminating the limitation of the business boundaries and enforcing the security priorities from the perimeter of the network. For maintaining the integrity of the corporate information focus should be given on the prevention of unauthorised access and maintaining a control on the wireless network environment. With the rapid growth in the adoption of the wireless network the implementation of network firewall, enforcing the security policy has become an important task for the prevention of the malicious attempt on the network
For the prevention of the network eavesdropping the wireless access point should be configured with WPA2 encryption because it provides better encryption than its primitive versions. It should also be analysed that if the router supports partitioning and layer 2 isolation can be applied for blocking the user to user communication and make the network secure from the internal users. For sharing of the file and the information the user needs to communicate with the RADIUS server and it needs complex configuration for connecting with the wireless network.
For the implementation of the secure enterprise wireless network it is important to analyse the different wireless standards and analyse the encryption methodology that can be selected for the development of the wireless network framework. The risk associated with the development of thee wireless network framework is analysed for the development of the WLAN network. The intruder can access the wireless network from remote location and use amplified equipment for breaking the wireless signals and gain the access of the framework. A proper planning should be made for defending the network from the external agents. A proper planning for the management of the configuration is essential for eliminating the risks and taking the necessary steps for protecting the network for the migration of the risks. There should be a classification of the data into private and public data for minimizing the bleeding of the control signals. Uni-directional antenna should be used for localizing the signal and shielding it from the external walls for expectation of the location. Each of the layers of the OSI model should be used for protecting the wireless network signal. There are different tools that are used for the penetration into the network and kali linux is the mostly used tool that are used for gaining the action of the network. With the growth of the wireless network IEEE 802.11 are widely used for the management of the media access control and it is important for the application of the encryption protocol for securing the access points.
The defence in depth technique is implemented with the application of WPA2 and enabling wireless intrusion detection system. An active scanning and monitoring of the unknown device also helps in prioritizing the deployment of the wireless network. There can be different types of attacks such as active, passive, inside, close in and distribution attacks. The link and network layer encryption can act as the first defence and security encryption can also be used for increasing the security. The defence mechanism for the active attack is to defend against the enclave boundary and defend from the computing environment. The insider content can also be protected with the application of personnel and physical security and auditing, authentication of the access The close in attacks can also be avoided with the application of physical and personnel security and using countermeasure for technical surveillance. The attacks in the distribution layer can be avoided with the use of trusted software and the use of run time integrity controls.
Conclusion
The secure enterprise wireless network solution is designed in Boson network for the identification of the new concept and technology used for the development of the network. For designing the network an analysis is made on the different available network device that can be used for serving the needs of the users using the enterprise network. Two network servers are used and configured according to the different service that are needed for providing authorization, authentication, integrity and prevention of the eavesdropping. An intrusion prevention system and an intrusion detection system is used for gathering evidence from the network and use it for securing the network. The combination of the password encryption protocol should use with the combination of alpha numeric and special character for increasing the security. The distribution layer switches are configured with VLAN for isolating the access point maintaining the stability of the WLAN. The default security mechanism can be altered and added with new security techniques for getting the best security solution. The application of WPA2 for increasing the security of data can help in enforcing the centralized security policy and enforcement of the wireless security policy for the access point. The effect on the ongoing traffic is analysed for identification of the impact of the application of the wireless security policy and reduce the error for getting the best possible output from the security policy designed for the WLAN of the enterprise.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download