This article discusses the security and ethical issues with WIFI networks and provides solutions to implement security systems. It includes network design, analysis of security tools, and IP design. The article also covers the logical and physical design of the network and provides IP tables for guest and normal users.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Contents Introduction.................................................................................................................................................2 Security issues.............................................................................................................................................2 Ethical issues with WIFI Networks.............................................................................................................2 Network design...........................................................................................................................................4 Network Topology Diagram........................................................................................................................9 Analysis of network security tools...............................................................................................................9 Implementing of Security Systems............................................................................................................10 CONCLUSION.............................................................................................................................................12 REFERENCES..............................................................................................................................................13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction In today scenario the wireless network systems are widely used in the industries. Due to its higher growth the threads involved in the wireless network also increases. So there is a need to provide security for the network systems. This can be obtained by following the rules and regulations. This phenomenon was known as wireless security. Here we are going to see about the problem faced by the automobile company on their network system deployment. The wireless network system was the most flexible as well as effective network system. But it has major flaws in its configurations. When compared to wired connection there is no physical control of the users. Here the user access are controlled by the authentication process. Wireless systems also reduce the initial costs. So the drawbacks like authentication problems must to be rectified. That is the only way to make the sustainable systems. The authentication process will be controlled by securing the governing policies. Because the wireless network system there is a possibility to attacked by the attackers. Unless we protect the system by employing the clear authentication process. Here the SQL servers are used to scan the server database. That acts like the server management system. Security issues Nowadays the computing system where becoming portable and smaller in size, so the devices has theft and the data are stolen. The stolen device has may store more data that can protected by security like encryption key. For security purpose the system gives solution as fingerprint recognition, scanning apply to mobile devices. For example the mobile device security improve many biometric security of HP IPAQ Pocket PC. The operating environments have needs for security at the levels of stages when incorporates by applications of security. The investigation have been done in this part. An example to block the file which are accessed by PDA device the system administrator need unblock the access files whether is the credentials are supplied improper. By severe loss of PDA operational have result in the part of environments, that are computerized in memory have wants to erase and disk data, by unsuccessful logins may leads to reset the hard disk. 2
Ethical issues with WIFI Networks The open network provides the free connection to use the network that leads to download and browse any information and there is no rules to use GPS devices for protection, In US rules the scanning of node is not illegal. But the information of the robbing service they can attack it [1]. By node scanning have to give the location and access point. The location privacy and access point have issued. In access point the common breaching are used as given below. To browse of adult website and affected network. To access the bank account and theft the currency. For hacking the system for the experience. The access point were setting the duplicate to understand of the scanning in more than two attempts in one day. In Africa the member are trying to use the credit card of the other member there caught by theft of more credit card pin. The ethical issues has cause the access of unauthorized data. For example In US a person has log on the computer by other person without any regulation by an open network. The data or network are accessed without any permission that may leads to robbing. Whether the network has access by unauthorized persons the administrator cannot use the bandwidth for long time. They wants to pay the money for the bandwidth compare to application that’s leads to gaming. For access the network, user can do anymore. In future the people are becoming the aware of network by this problems. For security the administrator are applying the passwords for each open network. But the now also hacking the internet access and they have many tools to recover the passwords and many website the help the hacker to hacks the passwords like remember password. The user are not configure the system if they don’t allot. The encryption keys have provide many high level security to the user. The authentication have provide mechanism in 802.11. Shared key Authentication:This authentication has process the response to complete and challenge the access point. Open system authentication: This authentication uses the SSID approach, the access can be granted whether it is SSID are not. Centralized authentication: This authentication the server are used. The network can access only in authentication. 3
Network design First floor Secound floor Third floor Fourth floor5computers2 printersVideo conference Video conference Conference room2 Conference room1 2IP Phones 2IP Phones 2IP phonesMD OFFICESwitch4 Switch3 Switch2 Switch1 5Computers 2Printers5IP Phones Finance Dept HR DeptIT SERVICE OFFICE 5Computer 2Printers 5IP Phones IT Printers 5Servers 10Computers5IP Phones Marketing DeptRetail Dept 10Computers 10Computers 2Printers 2IP Phones 2IP Phones 2 Printers 5IP Phones 2 Printers 2IP Phones10Computers25 Computers 5Printers Sales DeptLogistic Dept Core-Switch The Physical design in each floor is shown below for easy view and easy understanding. First Floor Design 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Second Floor Design Third Floor Design Fourth Floor Design The Design is done using Microsoft Visio (Microsoft.com, 2016) file is attached. The same is attached below. 5
The attached file need Microsoft Visio to open. In the above design, one computer/printer/IP Phone will be shown below which The number of computers/printers/IP Phones will be marked. (5 Computers, 2 Printers, 2 IP Phones) [6] [7] [8].This means that, that many computers/printers/IP Phones are connected with local switch of that floor of the device. No computers/printers/IP Phones are directly connected with the core switch. Logical Design The logical model represents the basic building blocks, divided by function, and the structure of the system [14]. IP Design ï‚·Define the subnet (based on: rooms, floor, department, or other criteria). ï‚·For each subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices. ï‚·The IP addresses should be clearly labelled on the diagram 1172.16.1.0255.255.255.192 2172.16.1.128255.255.255.224 3172.16.2.0255.255.255.192 4172.16.2.128255.255.255.224 5172.16.2.192255.255.255.224 6172.16.2.224255.255.255.224 7172.16.3.0255.255.255.224 8172.16.3.64255.255.255.224 9172.16.3.128255.255.255.224 1 st floor48 port swSwitch Cisco 2960 2nd floor48 port swSwitch Cisco 2960 3 floor48 port sw 4 floor24 port sw Netsim Work 6
Set off IP values are selected for guest users. Table1IP table for Guest users User NameIP AddressSub Net MaskDefault Gateway Guest1192.168.10.1255.255.255.0192.168.10.100 Guest2192.168.10.2255.255.255.0192.168.10.100 Guest3192.168.10.3255.255.255.0192.168.10.100 Guest4192.168.10.4255.255.255.0192.168.10.100 Guest5192.168.10.5255.255.255.0192.168.10.100 Guest6192.168.10.6255.255.255.0192.168.10.100 Guest7192.168.10.7255.255.255.0192.168.10.100 Guest8192.168.10.8255.255.255.0192.168.10.100 Guest9192.168.10.9255.255.255.0192.168.10.100 Guest10192.168.10.10255.255.255.0192.168.10.100 IP Values for Guest users are showed in the above table. Table2IP Table for Normal Users User NameIP AddressSub Net MaskDefault Gateway User1192.168.10.11255.255.255.0192.168.10.100 User2192.168.10.12255.255.255.0192.168.10.100 User3192.168.10.13255.255.255.0192.168.10.100 User4192.168.10.14255.255.255.0192.168.10.100 User5192.168.10.15255.255.255.0192.168.10.100 User6192.168.10.16255.255.255.0192.168.10.100 User7192.168.10.17255.255.255.0192.168.10.100 User8192.168.10.18255.255.255.0192.168.10.100 User9192.168.10.19255.255.255.0192.168.10.100 User10192.168.10.20255.255.255.0192.168.10.100 User11192.168.10.21255.255.255.0192.168.10.100 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
User12192.168.10.22255.255.255.0192.168.10.100 User13192.168.10.23255.255.255.0192.168.10.100 User14192.168.10.24255.255.255.0192.168.10.100 User15192.168.10.25255.255.255.0192.168.10.100 User16192.168.10.26255.255.255.0192.168.10.100 User17192.168.10.27255.255.255.0192.168.10.100 User18192.168.10.28255.255.255.0192.168.10.100 User19192.168.10.29255.255.255.0192.168.10.100 User20192.168.10.30255.255.255.0192.168.10.100 User21192.168.10.31255.255.255.0192.168.10.100 User22192.168.10.32255.255.255.0192.168.10.100 User23192.168.10.33255.255.255.0192.168.10.100 User24192.168.10.34255.255.255.0192.168.10.100 User25192.168.10.35255.255.255.0192.168.10.100 User26192.168.10.36255.255.255.0192.168.10.100 User27192.168.10.37255.255.255.0192.168.10.100 User28192.168.10.38255.255.255.0192.168.10.100 User29192.168.10.39255.255.255.0192.168.10.100 User30192.168.10.40255.255.255.0192.168.10.100 User31192.168.10.41255.255.255.0192.168.10.100 User32192.168.10.42255.255.255.0192.168.10.100 User33192.168.10.43255.255.255.0192.168.10.100 User34192.168.10.44255.255.255.0192.168.10.100 User35192.168.10.45255.255.255.0192.168.10.100 User36192.168.10.46255.255.255.0192.168.10.100 User37192.168.10.47255.255.255.0192.168.10.100 User38192.168.10.48255.255.255.0192.168.10.100 User39192.168.10.49255.255.255.0192.168.10.100 User40192.168.10.50255.255.255.0192.168.10.100 IP Values for Normal users (Office use) are showed here. 8
Network Topology Diagram Network topology diagram was the graphical representation of the network to be created [3] [7]. That was created with the help of network simulating software [13]. In this project NetSim software was used to create the design of the network and its configuration. Here we can also simulate the performance of the network [4]. Here the file created by the netsim software was enclosed here. Analysis of network security tools In Wi-Fi network system there are many types of security credentials are used. Here we are going to see about those kind of security protocols. Mainly WPA2 as well as RADIUS are used in wireless security system. Here we are going to see about those protocols. WPA2 It is abbreviated as Wifi Protected Access-2. This is the advanced version of WPA. This is commonly used security system in wireless network system. From latter 2006 all the standard wifi devices are use these technology. This technology was used to encrypt the data packets. That provides security to the transmitted data. This technology provides higher security to the data transmitted through the wireless data. This available in two variants. Both techniques are same by the function by differentiated by the purpose. And they are WPA2 Personal, WPA2 9
Enterprise. It ensures the confidentiality of the network system. If we implemented those system there is no need to worry about the unauthorized users. Because that allows only the authorized users. It works based on the IEEE802.11i standards [10] [11][12]. This gives the highest protection against attackers by make the strong and secure authentication process. The WPA2 personal was used for protect the network system by setting the password. But WPA2 Enterprise was server based verification system. RADIUS It is abbreviated as Remote Authentication Dial In User Service. This technology was established by the Livingston-Enterprises [2] [4]. The main purpose of this technology was to provide security to the wireless network system by creating the strong authentication process. This technology was based on the RFC2866 standard. Here the authenticating process was carried out by this protocol. Each and every users are must register by the administrator. Here the user ID as well as the password was given to the users. If the user can’t give the correct username as well as the password. He can’t able to access the network system. The entered access ID was compared with already registered ID. If both ID matched the access permission was given to the user [9]. This also called as the client server protocol [5]. This technology uses the variety of methods to ensure the proper authentication process, and they are PAP, PPP etc. Implementing of Security Systems. Here the above described two security systems are implemented in the developed wireless network to ensure the safety of the system. Here we are going to see about the how to implement the two protocols. WPA2 The implementation of the WPA2 system was basically done by the four stages. And they are explained below [3]. Stage 1 Checking pre – requirements This the first stage of implementation. That is common for both methods. Here we need to check the pre requirements of the protocol and check the compatibility of the OS. Generally all the latest operating systems are compatible for this protocol. If we use the older software we need to use the support software like patching software, etc. 10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Stage 2 Check Wireless Adapter configurations. Here the OS as well as the wireless adapter must compatible with this protocol. Unless we can’t use this security protocol. If the adapter was internally fixed with the system we need to install the supporting files. Stage 3 Router configuration Then the third step was configure the router. Here we need to check the compatibility of the router. All the latest routers are suited for implement this protocol. The above showed figure shows the router configuration setting page. It was looks similar to the above showed image. But it changes with respect to the company. Step 4. Finishing the configuration: This is the last stage of the setup. Here we can able to see the active user details. But we need to keep the password confidentially. That was showed in the below figure 11
. RADIUS In administrator system we need to do the following changes. Step 1: Start -> Administrative-tools -> Internet Authentication Step 2: Check the active directory register to ensure the RADIUS-server. Step 3:Internet-Authentication-Service -> register server Step 4: Radius client folder -> Add New-Client Step 5: Fill the client details Step 6: Press Next Step 7: Additional-Information->Client-Vendor-> SelectRADIUS Standard-> Set password Step 8: Press Finish. The below Configuration shows the Radius authentication for wireless users. • Configure a local authenticator in a wireless LAN used by three APs all sharing the same key. Configure user groups: corp_users , guest. Configure individual users, each of which will authenticate to the AP using either a personal password The authentication method Clientïƒ Access Pointïƒ Radius Server configure terminal radius-server local nas 10.0.0.2 key 172432 12
nas 10.0.0.3 key 172432 group corp_users vlan 100 ssid Corp_Users reauthentication time 1800 block count 2 time 600 group Corp_Users vlan 200 ssid Guest reauthentication time 1800 block count 2 time 600 group Guest exit user user-1 password xxxx group Corp_Users user user-2 password xxx group Corp_Users user user-5 password xxxx group Guest user user-6 password xxx group Guest copy running-config startup-config ! The below users will authenticate Radius server with the password created by themselves. user user-1 user user-2 user user-5 user user-6 13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Configuring an Authentication Policy 1.In Radius server we use Cisco ACS as Radisu Server 2.Create sub-rule aNameWi-Fi-Auth 3.Click the small window icon to open theConditionsmenu. 4.SelectCreate New Condition 5.SelectNetwork Access > EapAuthentication. 6.In the last box select EAP-MSCHAPv2. Radius Server configuration 14
Radius Server configuration show the below configuration i.Authorization ii.Authentication iii.Integrity iv.Network eavesdropping prevention 15
16
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Authentication ServerConfiguration from the Access Point 17
18
CONCLUSION At the end of the report the secured wireless network was created. Here the network system was protected by the WPA2 as well as RADIUS protocols. The logical network system was developed as well as simulated by using the netsim software. The different legal issues involved in the wireless network was analyzed. The security protocols are analyzed as well as the implemented in the wireless system. 19
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.