SSID management
• Change the SSID to something not-so obvious
• Disable SSID broadcasting?
• SSID is easily determined through
wireless network analysis
• Security through obscurity
Wireless encryption
• All wireless computers are radio
transmitters and receivers
• Anyone can listen in
• Only people with the password can
transmit and listen
• WPA2 encryption
Power level controls
Using WPS
• Different ways to connect
• PIN configured on access point must be
entered on the mobile device
• Push a button on the access point
• Near-field communication - Bring the
mobile device close to the access point
• USB method - no longer used
Default usernames and passwords
• All access points have default
usernames and passwords
• Change yours!
• Very easy to find the defaults for your WAP or router
MAC address filtering
• Easy to find working MAC addresses
through wireless LAN analysis
• MAC addresses can be spoofed
• Free open-source software
• Security through obscurity
IP addressing
• DHCP (automatic) IP addressing vs.
manual IP addressing
• IP addresses are easy to see in an
unencrypted network
• If the encryption is broken, the IP addresses
will be obvious
• Configuring a static IP address is not a
security technique
• Security through obscurity
SOHO firewalls
Firewall settings
• Inbound traffic
• Extensive filtering and firewall rules
• Allow only required traffic
• Configure port forwarding to map TCP/UDP ports
to a device
• Consider building a DMZ
Disabling ports
Content filtering
The process of planning and designing new WLANs for optimal performance, security and compliance typically involves:
Wireless site survey
An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:
War driving
Which WAP configuration setting allows for adjusting the boundary range of a wireless signal?
Power level controls