MN603 Wireless Networks Security - Secure Enterprise Network Design

Verified

Added on  2023/06/11

|14
|2958
|448
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Contents
Introduction.................................................................................................................................................2
Security issues.............................................................................................................................................2
Ethical issues with WIFI Networks.............................................................................................................2
Network design...........................................................................................................................................4
Network Topology Diagram........................................................................................................................9
Analysis of network security tools...............................................................................................................9
Implementing of Security Systems............................................................................................................10
CONCLUSION.............................................................................................................................................12
REFERENCES..............................................................................................................................................13
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
In today scenario the wireless network systems are widely used in the industries. Due to
its higher growth the threads involved in the wireless network also increases. So there is a need
to provide security for the network systems. This can be obtained by following the rules and
regulations. This phenomenon was known as wireless security. Here we are going to see about
the problem faced by the automobile company on their network system deployment. The
wireless network system was the most flexible as well as effective network system. But it has
major flaws in its configurations. When compared to wired connection there is no physical
control of the users. Here the user access are controlled by the authentication process. Wireless
systems also reduce the initial costs. So the drawbacks like authentication problems must to be
rectified. That is the only way to make the sustainable systems. The authentication process will
be controlled by securing the governing policies. Because the wireless network system there is a
possibility to attacked by the attackers. Unless we protect the system by employing the clear
authentication process. Here the SQL servers are used to scan the server database. That acts like
the server management system.
Security issues
Nowadays the computing system where becoming portable and smaller in size, so the
devices has theft and the data are stolen. The stolen device has may store more data that can
protected by security like encryption key. For security purpose the system gives solution as
fingerprint recognition, scanning apply to mobile devices. For example the mobile device
security improve many biometric security of HP IPAQ Pocket PC. The operating environments
have needs for security at the levels of stages when incorporates by applications of security. The
investigation have been done in this part. An example to block the file which are accessed by
PDA device the system administrator need unblock the access files whether is the credentials are
supplied improper. By severe loss of PDA operational have result in the part of environments,
that are computerized in memory have wants to erase and disk data, by unsuccessful logins may
leads to reset the hard disk. In wireless network system there is no physical security was
available like the wired connection. In wired LAN connection the computers are connected by
the wires as well as optical fiber cables. They provide the physical security for the data
transferred by the computers. But wireless connectivity that uses some kind of waves they are
capable of transmitting the data packets. So the wireless network connection authentication
2
Document Page
process must be very strong and not easily hackable. For this purpose there are many methods
are used. But WEP, WPA, WPA 2.
Ethical issues with WIFI Networks
The open network provides the free connection to use the network that leads to download and
browse any information and there is no rules to use GPS devices for protection, In US rules the
scanning of node is not illegal. But the information of the robbing service they can attack it [1].
By node scanning have to give the location and access point. The location privacy and access
point have issued. In access point the common breaching are used as given below.
To browse of adult website and affected network.
To access the bank account and theft the currency.
For hacking the system for the experience.
The access point were setting the duplicate to understand of the scanning in more than two
attempts in one day. In Africa the member are trying to use the credit card of the other member
there caught by theft of more credit card pin.
The ethical issues has cause the access of unauthorized data. For example In US a person has log
on the computer by other person without any regulation by an open network. The data or
network are accessed without any permission that may leads to robbing. Whether the network
has access by unauthorized persons the administrator cannot use the bandwidth for long time.
They wants to pay the money for the bandwidth compare to application that’s leads to gaming.
For access the network, user can do anymore. In future the people are becoming the aware of
network by this problems. For security the administrator are applying the passwords for each
open network. But the now also hacking the internet access and they have many tools to recover
the passwords and many website the help the hacker to hacks the passwords like remember
password. The user are not configure the system if they don’t allot. The encryption keys have
provide many high level security to the user. The authentication have provide mechanism in
802.11.
Shared key Authentication: This authentication has process the response to complete and
challenge the access point.
Open system authentication: This authentication uses the SSID approach, the access can be
granted whether it is SSID are not.
3
Document Page
Centralized authentication: This authentication the server are used. The network can access only
in authentication.
Network design
Here the physical configuration of the different floors of the office was showed.
Configuration for 1st Floor
4
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Configuration for 2nd Floor
Configuration 3rd floor
Configuration of 4th floor
Above showed configuration diagram was drawn by the MS Visio software (Microsoft.com,
2016), here the created diagram was enclosed.
The developed design contains the information about the devices that are connected with
the networks was showed [6] [7] [8].
Logical Design
The rational model represents the basic constructing blocks, divided by purpose, & the
configuration [14].
IP Design
Define the subnet (based on: rooms, floor, department, or other criteria).
5
Document Page
For each subnet, define the network address, subnet mask, and available IP addresses to be
used by computers or devices.
The IP addresses should be clearly labelled on the diagram
1 172.16.1.0 255.255.255.192
2 172.16.1.128 255.255.255.224
3 172.16.2.0 255.255.255.192
4 172.16.2.128 255.255.255.224
5 172.16.2.192 255.255.255.224
6 172.16.2.224 255.255.255.224
7 172.16.3.0 255.255.255.224
8 172.16.3.64 255.255.255.224
9 172.16.3.128 255.255.255.224
1 st floor 48 port sw Switch Cisco 2960
2nd floor 48 port sw Switch Cisco 2960
3 floor 48 port sw
4 floor 24 port sw
Netsim Work
Set off IP values are selected for guest users.
Table 1 IP table for Guest users
User Name IP Address Sub Net Mask Default Gateway
Guest1 192.168.10.1 255.255.255.0 192.168.10.100
Guest2 192.168.10.2 255.255.255.0 192.168.10.100
Guest3 192.168.10.3 255.255.255.0 192.168.10.100
Guest4 192.168.10.4 255.255.255.0 192.168.10.100
Guest5 192.168.10.5 255.255.255.0 192.168.10.100
Guest6 192.168.10.6 255.255.255.0 192.168.10.100
Guest7 192.168.10.7 255.255.255.0 192.168.10.100
Guest8 192.168.10.8 255.255.255.0 192.168.10.100
6
Document Page
Guest9 192.168.10.9 255.255.255.0 192.168.10.100
Guest10 192.168.10.10 255.255.255.0 192.168.10.100
IP Values for Guest users are showed in the above table.
Table 2 IP Table for Normal Users
User Name IP Address Sub Net Mask Default Gateway
User1 192.168.10.11 255.255.255.0 192.168.10.100
User2 192.168.10.12 255.255.255.0 192.168.10.100
User3 192.168.10.13 255.255.255.0 192.168.10.100
User4 192.168.10.14 255.255.255.0 192.168.10.100
User5 192.168.10.15 255.255.255.0 192.168.10.100
User6 192.168.10.16 255.255.255.0 192.168.10.100
User7 192.168.10.17 255.255.255.0 192.168.10.100
User8 192.168.10.18 255.255.255.0 192.168.10.100
User9 192.168.10.19 255.255.255.0 192.168.10.100
User10 192.168.10.20 255.255.255.0 192.168.10.100
User11 192.168.10.21 255.255.255.0 192.168.10.100
User12 192.168.10.22 255.255.255.0 192.168.10.100
User13 192.168.10.23 255.255.255.0 192.168.10.100
User14 192.168.10.24 255.255.255.0 192.168.10.100
User15 192.168.10.25 255.255.255.0 192.168.10.100
User16 192.168.10.26 255.255.255.0 192.168.10.100
User17 192.168.10.27 255.255.255.0 192.168.10.100
User18 192.168.10.28 255.255.255.0 192.168.10.100
User19 192.168.10.29 255.255.255.0 192.168.10.100
User20 192.168.10.30 255.255.255.0 192.168.10.100
User21 192.168.10.31 255.255.255.0 192.168.10.100
User22 192.168.10.32 255.255.255.0 192.168.10.100
User23 192.168.10.33 255.255.255.0 192.168.10.100
User24 192.168.10.34 255.255.255.0 192.168.10.100
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
User25 192.168.10.35 255.255.255.0 192.168.10.100
User26 192.168.10.36 255.255.255.0 192.168.10.100
User27 192.168.10.37 255.255.255.0 192.168.10.100
User28 192.168.10.38 255.255.255.0 192.168.10.100
User29 192.168.10.39 255.255.255.0 192.168.10.100
User30 192.168.10.40 255.255.255.0 192.168.10.100
User31 192.168.10.41 255.255.255.0 192.168.10.100
User32 192.168.10.42 255.255.255.0 192.168.10.100
User33 192.168.10.43 255.255.255.0 192.168.10.100
User34 192.168.10.44 255.255.255.0 192.168.10.100
User35 192.168.10.45 255.255.255.0 192.168.10.100
User36 192.168.10.46 255.255.255.0 192.168.10.100
User37 192.168.10.47 255.255.255.0 192.168.10.100
User38 192.168.10.48 255.255.255.0 192.168.10.100
User39 192.168.10.49 255.255.255.0 192.168.10.100
User40 192.168.10.50 255.255.255.0 192.168.10.100
IP Values for Normal users (Office use) are showed here.
Network Topology Diagram
8
Document Page
Network topology diagram was the graphical representation of the network to be created
[3] [7]. That was created with the help of network simulating software [13]. In this project
NetSim software was used to create the design of the network and its configuration. Here we can
also simulate the performance of the network [4]. Here the file created by the netsim software
was enclosed here.
Analysis of network security tools
In Wi-Fi network system there are many types of security credentials are used. Here we
are going to see about those kind of security protocols. Mainly WPA2 as well as RADIUS are
used in wireless security system. Here we are going to see about those protocols.
WPA2
It is abbreviated as Wifi Protected Access-2. This is the advanced version of WPA. This
is commonly used security system in wireless network system. From latter 2006 all the standard
wifi devices are use these technology. This technology was used to encrypt the data packets.
That provides security to the transmitted data. This technology provides higher security to the
data transmitted through the wireless data. This available in two variants. Both techniques are
same by the function by differentiated by the purpose. And they are WPA2 Personal, WPA2
Enterprise. It ensures the confidentiality of the network system. If we implemented those system
there is no need to worry about the unauthorized users. Because that allows only the authorized
users. It works based on the IEEE802.11i standards [10] [11][12]. This gives the highest
protection against attackers by make the strong and secure authentication process. The WPA2
personal was used for protect the network system by setting the password. But WPA2 Enterprise
was server based verification system.
RADIUS
It is abbreviated as Remote Authentication Dial In User Service. This technology was
established by the Livingston-Enterprises [2] [4]. The main purpose of this technology was to
provide security to the wireless network system by creating the strong authentication process.
This technology was based on the RFC2866 standard. Here the authenticating process was
carried out by this protocol. Each and every users are must register by the administrator. Here the
user ID as well as the password was given to the users. If the user can’t give the correct
username as well as the password. He can’t able to access the network system. The entered
access ID was compared with already registered ID. If both ID matched the access permission
9
Document Page
was given to the user [9]. This also called as the client server protocol [5]. This technology uses
the variety of methods to ensure the proper authentication process, and they are PAP, PPP etc.
Implementing of Security Systems.
Here the above described two security systems are implemented in the developed
wireless network to ensure the safety of the system. Here we are going to see about the how to
implement the two protocols.
WPA2
The implementation of the WPA2 system was basically done by the four stages. And they
are explained below [3].
Stage 1 Checking pre – requirements
This the first stage of implementation. That is common for both methods. Here we need
to check the pre requirements of the protocol and check the compatibility of the OS. Generally
all the latest operating systems are compatible for this protocol. If we use the older software we
need to use the support software like patching software, etc.
Stage 2 Check Wireless Adapter configurations.
Here the OS as well as the wireless adapter must compatible with this protocol. Unless
we can’t use this security protocol. If the adapter was internally fixed with the system we need to
install the supporting files.
Stage 3 Router configuration
Then the third step was configure the router. Here we need to check the compatibility of
the router. All the latest routers are suited for implement this protocol.
10
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
The above showed figure shows the router configuration setting page. It was looks similar to the
above showed image. But it changes with respect to the company.
Step 4. Finishing the configuration:
This is the last stage of the setup. Here we can able to see the active user details. But we
need to keep the password confidentially. That was showed in the below figure
.
RADIUS
In administrator system we need to do the following changes.
Step 1: Start -> Administrative-tools -> Internet Authentication
Step 2: Check the active directory register to ensure the RADIUS-server.
Step 3: Internet-Authentication-Service -> register server
Step 4: Radius client folder -> Add New-Client
Step 5: Fill the client details
Step 6: Press Next
11
Document Page
Step 7: Additional-Information -> Client-Vendor-> Select RADIUS Standard -> Set password
Step 8: Press Finish.
CONCLUSION
At the end of the report the secured wireless network was created. Here the network
system was protected by the WPA2 as well as RADIUS protocols. The logical network system
was developed as well as simulated by using the netsim software. The different legal issues
involved in the wireless network was analyzed. The security protocols are analyzed as well as the
implemented in the wireless system.
12
Document Page
REFERENCES
[1]"Wireless", Ethics.csc.ncsu.edu, 2018. [Online]. Available:
https://ethics.csc.ncsu.edu/risks/security/wireless/study.php. [Accessed: 31- May- 2018].
[2]"Configuring RADIUS servers", Technet.microsoft.com, 2018. [Online]. Available:
https://technet.microsoft.com/en-us/library/cc995218.aspx. [Accessed: 31- May- 2018].
[3]D. Strom, "Tutorial: How to set up WPA2 on your wireless network", Computerworld, 2018.
[Online]. Available:
https://www.computerworld.com/article/2547129/mobile-wireless/tutorial--how-to-set-up-
wpa2-on-your-wireless-network.html. [Accessed: 31- May- 2018].
[4]E. Geier, "Low-cost RADIUS servers for Wi-Fi security", Computerworld, 2018. [Online].
Available: https://www.computerworld.com/article/2492402/wireless-networking/low-cost-
radius-servers-for-wi-fi-security.html. [Accessed: 31- May- 2018].
[5]F. Paul Funk, "The expanding role of the RADIUS server", Computerworld, 2018. [Online].
Available: https://www.computerworld.com/article/2574976/security0/the-expanding-role-
of-the-radius-server.html. [Accessed: 31- May- 2018].
[6]S. Categories, W. Videos, W. Gallery, 2. Locations, W. #WLPC?, L. Library, H. Works, E.
Library, T. Conditions and P. Policy, "Wireless Design Principles and Best Practices |
Wireless LAN Professionals", Wireless LAN Professionals, 2018. [Online]. Available:
https://www.wlanpros.com/resources/wireless-design-principles-best-practices/. [Accessed:
31- May- 2018].
[7]J. Abraham, "3 WLAN Design Best Practices Essential To Deliver a Better User
Experience", Securedgenetworks.com, 2018. [Online]. Available:
https://www.securedgenetworks.com/blog/3-wlan-design-best-practices-essential-to-deliver-
a-better-user-experience. [Accessed: 31- May- 2018].
[8]"WLAN Design Best Practices And Challenges", Network Computing, 2018. [Online].
Available: https://www.networkcomputing.com/wireless-infrastructure/wlan-design-best-
practices-and-challenges/49809405. [Accessed: 31- May- 2018].
[9]"RADIUS Protocol", Docs.oracle.com, 2018. [Online]. Available:
https://docs.oracle.com/cd/E70765_01/doc.113/e72005/rp_radius.htm#ICPRP168.
[Accessed: 31- May- 2018].
13
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
[10]"KRACK Attacks: Breaking WPA2", Krackattacks.com, 2018. [Online]. Available:
https://www.krackattacks.com/. [Accessed: 31- May- 2018].
[11]"The Difference Between WEP, WPA, and WPA2 Wi-Fi Passwords", Howtogeek.com,
2018. [Online]. Available: https://www.howtogeek.com/167783/htg-explains-the-
difference-between-wep-wpa-and-wpa2-wireless-encryption-and-why-it-matters/.
[Accessed: 31- May- 2018].
[12]"What you need to do about the WPA2 Wi-Fi network vulnerability", Us.norton.com, 2018.
[Online]. Available: https://us.norton.com/internetsecurity-emerging-threats-what-to-do-
about-krack-vulnerability.html. [Accessed: 31- May- 2018].
[13]"Types of Network Topology in Computer Networks | Studytonight", Studytonight.com,
2018. [Online]. Available: https://www.studytonight.com/computer-networks/network-
topology-types. [Accessed: 31- May- 2018].
[14]"Types of Wireless Networks | Commotion Wireless", Commotionwireless.net, 2018.
[Online]. Available: https://commotionwireless.net/docs/cck/networking/types-of-wireless-
networks/. [Accessed: 31- May- 2018].
14
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]