4.0 Network+ Certification Cram Notes : Network Security
4.3 Explain the following network hardening best practices.
Wireless security techniques
1. MAC filtering: This technique involves allowing or denying access to a wireless network based on the unique Media Access Control (MAC) address of a device. The administrator creates a list of allowed or disallowed MAC addresses, and devices with MAC addresses not on the list will be unable to connect to the network.
2. Antenna placement: This refers to the physical placement of wireless antennas within a network. Proper antenna placement can help to improve the coverage and security of a wireless network.
3. Power levels: The power level of a wireless network's signal can be adjusted to limit the range of the network and prevent unauthorized devices from accessing it. Lowering the power level can also help to reduce interference from neighboring wireless networks.
4. Wireless client isolation: This feature prevents wireless clients from communicating directly with each other on a wireless network. This can help to reduce the risk of malicious activity, such as malware infections or unauthorized data transfers, between clients.
5. Guest network isolation: This involves creating a separate, isolated network for guests to use when accessing the Internet, separate from the primary network used by employees or other authorized users. This helps to prevent unauthorized access to the primary network and its data.
6. Preshared keys (PSKs): A PSK is a secret password shared between the client and the wireless access point (AP). This password is used to encrypt wireless data and is entered manually by the user.