by VentureStreet  Join Our Network
Securing your Wireless Network




You need to always add security to your wireless network.

The first type is called authentication: For there are several distros out there where you can load it onto an old 500 mhz pc with two nics, and authenticate, or at least have a login and disclaimer page.

Second type is called encryption. To secure your radio this way, log into your access point or meshAP and select WPA2. Selecting better security is needed to limit those unwanted wireless guest.

WiFi Protected Access - WPA
WPA encrypts information, and it also checks to make sure that the network security key has not been modified. WPA also authenticates users to help ensure that only authorized people can access the network.

There are two types of WPA authentication: WPA and WPA2. WPA is designed to work with all wireless network adapters, but it might not work with older routers or access points. WPA2 is more secure than WPA, but it will not work with some older network adapters. WPA is designed to be used with an 802.1X authentication server, which distributes different keys to each user. This is referred to as WPA-Enterprise or WPA2-Enterprise. It can also be used in a pre-shared key (PSK) mode, where every user is given the same passphrase. This is referred to as WPA-Personal or WPA2-Personal.

Wired Equivalent Privacy (WEP)
WEP is an older network security method that is still available to support older devices, but it is no longer recommended. When you enable WEP, you set up a network security key. This key encrypts the information that one computer sends to another computer across your network. However, WEP security is relatively easy to crack.

80.2.X authentication
802.1X authentication can help enhance security for 802.11 wireless networks and wired Ethernet networks. 802.1X uses an authentication server to validate users and provide network access. On wireless networks, 802.1X can work with Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA) keys. This type of authentication is typically used when connecting to a workplace network.



Need some help? We can match you to a company in your local area.
Find Local Companies
Other articles you may like:
Leaders in a New Profession
Do something today that your future self will thank you for!

Is Your Mobile Guru Costing You Money?
This article is a report on how mobile training is essential to the success of any...

When to Hire a Ghost-Writer
Ghost-writers provide editorial substance without taking the credit, but the cast a big...

Why Should I Market My Business With Video?
Do something unique to rise above your competitors. Tell your story in your own...

What is the Lead Exchange?
Learn about the ProMatcher Lead Exchange and how you can earn free leads.

Be the first to find this article helpful.
Need some help? We can match you to a company in your local area.
About the Author

Ted Green, GHz Wireless
4719 S Congress Ave, STE 105
Austin, TX 78745
(512) 981-7115

Contact Author: request info

If you would like to re-print this article, please contact the author.
Other articles you may like:
The ProMatcher Philosophy
Learn about our business philosophy and why we believe in supporting small businesses.

Article and Video Submission
Learn how submitting an article or video can help build your credibility and grow your...

Why You Should Invite Your Friends
Learn how inviting your friends to join ProMatcher can benefit you and your business.

Perfecting Your Profile
Learn the importance of having a robust company profile. A great profile sets your...

Why We Collect Cost Data
Learn why ProMatcher collects cost information from our professional network.

Editorial Disclaimer: The views expressed in articles published on this website are those of the authors alone. They do not represent the views or opinions of this website or its staff. The articles on this site do not constitute a recommendation or endorsement with respect to any views, company, or product. Authors affirm that article submissions are their original content or that they have permission to reproduce.

Home   |   Articles & Videos   |   Affiliates   |   Networking Groups   |   Search by Category

Terms of Use   |   Privacy   |   About Us   |   Contact Us   |   Member Login

©2003-2024 - VentureStreet, LLC

Join Our Business Network