THE 3
rd
INTERNATIONAL SCIENTIFIC CONFERENCES OF STUDENTS AND YOUNG RESEARCHERS
dedicated to the 99
th
anniversary of the National Leader of Azerbaijan Heydar Aliyev
214
The following techniques can be provided by WLAN technology to ensure
data security for wireless users:
WIDS and WIPS are intrusion detection and prevention systems that
detect and protect against unwanted users.
Wireless users' security rules
include link authentication, access
authentication, and data encryption.
Wireless service
security measures
Monitor APs can be configured to prevent network infiltration. By
periodically listening on wireless signals, the wireless
intrusion detection
system (WIDS) can detect illegal users and APs when configured. The AC
gathers data about wireless devices and can take action against illegitimate
devices.
Configure the AP's functioning mode before configuring WIDS on it.
An AP can operate in one of two modes:
Normal:
signifies that the mode is normal.
When air scan features on a radio are disabled (such as WIDS, spectrum
analysis, and terminal location), the radio is utilized to broadcast common
WLAN services.
When a radio's air scan functions are enabled,
it sends common WLAN
services while simultaneously serving as a monitoring device. There may be
a brief increase in WLAN service latency, however this will not impede network
connectivity. If any latency-sensitive service (such as videoconferencing) is in
use, it is advised that air scan be done on a separate radio.
Dostları ilə paylaş: