logo

Secure Enterprise Wireless Network Design and Implementation

   

Added on  2023-06-04

10 Pages2409 Words121 Views
Network and Security

Table of Contents
1 Introduction.......................................................................................................................2
2 Ethical Implications..........................................................................................................3
3 Secure Enterprise Wireless Network Design..................................................................3
4 Analysis of Secure Enterprise Wireless Network..........................................................5
5 Implementation of Secure Enterprise Wireless Network.............................................6
6 Testing................................................................................................................................7
7 Conclusion.........................................................................................................................8
References.................................................................................................................................9
1

1 Introduction
Primary objective of this project is to make a protected endeavour wireless network, as
it is the basic requirement for the current network engineering. This network is utilized to
help the cell phones and provides high network availability. The enterprise network security
is the insurance of a network that associates with the frameworks, centralized servers, and
the devices such as the cell phones and tablets inside the endeavour. The organizations,
colleges, governments, and different other areas utilizes the job of the networks to help in
interfacing data with their clients and individuals. As the network develops in size, many-
sided quality, security concerns likewise increases. Utilizing the dynamic WIDS and WIPS
empowers arrangement of overseers to make and implement wireless security, by checking,
identifying, and relieving the potential dangers. Both, WIDS and WIPS will identify and
naturally detach the unapproved devices. WIDS provides the capacity to naturally screen
and distinguish the nearness of any unapproved, bad access points, whereas the WIPS
conveys the counter measures for recognizing the dangers. Some regular dangers regulated
by WIPS are, maverick access, misconfigured passages, customer misassociation,
unapproved affiliation, man-in-the-middle attacks, unprepared networks, Media Access
Control, honeypot and desirable twin attacks, and denial of-services assaults.
This task utilizes the two servers namely, RADIUS server and WPA2 Server. These two
server are utilized to deliver safe wireless network. The WPA2 incorporates the utilized
wireless verification of client’s tasks interactions for arrangement administrations. The
RADIUS server designs the procedure of two accesses that are utilized for data encryption.
The client’s working arrangement is related to designing the procedure encryption and
settings of IEEE802.1x. At last, it associates safe working wireless network. The utilization of
WPA2 and RADIUS server is utilized for developing protected wireless network for the
enterprise. Then, the business wireless plan for the protected tasks are worked on, by
utilizing Boson Netsim. At that point, differentiate and actualize the safe working of the
wireless network. Finally, test the developed network, by utilizing the ping network present
on the Boson Netsim. All the above mentioned aspects will be broken down and exhibited in
detail.
2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Creating a Secure Enterprise Wireless Network with Ethical Implications
|9
|2358
|138

Importance of VPN for JKS Accounting Information System
|8
|898
|465

Remote Network Access: Goals, Design, Security and Risks
|9
|1055
|234

Wireless Network and Security: Design, Implementation and Testing
|14
|2646
|165

Security Issues in Wireless Protocols
|21
|4955
|66

Wi-Fi Protected Access: A Secure Communication Protocol
|12
|782
|60