Security threats in a Wi-Fi Network

This article attempts to understand what kind of threats a Wi-Fi network could face, especially given the fact that even a person going on a road nearby could reach the enterprise Wi-Fi singals. We look at the vulnerabilities of WEP network, Network sniffers, SSID broadcasting, DOS attacks, De-Auth attacks, Mac-address spoofing, Man-in-the-middle attacks, honey pot attacks, rogue access points and the threat faced by them, Patches in your PC not being up to date, ad-hoc networks, Special Wi-Fi devices like Wireless cameras and wireless phones, loopholes in the authentication protocols, hackers who escape counter scanning by wireless IDS devices.

Continue reading

Wireless Mesh Networks

This article is about Wireless Mesh networks – how they eliminate the wires that connect to the wireless access point, applications of a mesh network, how mesh networks are formed and managed, what is mesh clustering and what are the advantages, what are the dis-advantages of a mesh network and of course, why mesh networks are exciting.

Continue reading

Why is RF Spectrum Management/ Radio management important in Wireless networks?

This article discusses why is RF Spectrum management / Radio management is crucial in wireless networks and how wireless controllers help managing the same. We look at co-channel interference and its effects on neighbouring AP’s, how co-channel interference is minimized by controllers, and the options available for optimizing the performance of wireless clients by managing the RF Spectrum better.

Continue reading

Network Access Control in Wi-Fi (Wireless) Controller based solution

This article throws light into the possible ways of controlling the network access for a wireless user, types of authentication for wireless users, if the wireless users could be sub-grouped and policies enforced per sub-group, about port based controlling and user based controlling of sub-groups, if secure guest access can be provided through a captive portal, if the Quality Of Service can be enforced, bandwidth limitation could be done per user, if the wireless controller can be integrated with the existing NAC device of the company etc.

Continue reading