Advanced Search
Search Results
651 total results found
Advanced VLAN Configuration
i need a superhighway that destroys all the poor neighborhoods but instead it's a network ok so since VLANs need to be explicitly (logically) connected to each other even though they might be on the same physical interface we need to be able to connect switche...
Access Control Methods
now how exactly should i go about ensuring that employee's can't see the 15 terabytes of data i've scraped from them over the years Authenticated users can be granted rights and permissions to access resources on a network. This is called authorization. How do...
IEEE 802.1X
what if i just used a specific port and trusted everything on that 802.1X: Port-Based Network Access Control (NAC) 802.1X is a standard for encapsulating EAP communications over a LAN network to implement port-based authentication. It basically lets identity p...
Network Access Control
you better be able to trust your network administrators (i.e. pay them well) Network Access Control is basically authenticating endpoints before they can fully connect to the network. We can do this using any type of port security mechanism. Disable Unneeded S...
Device Hardening
the device needs to be rock hard Hardening is basically making any device secure against tampering and abuse. Change default password Enforce password complexity and length requirements Use role-based access Disable unneeded network services like Telnet or VN...
Content Filtering
im so tired i can't do this anymore i can't think Content filtering can apply Application layer filters based on HTTP data. Most firewalls and proxies support some form of content filtering. Common Filtering Criteria URL filtering Content and reputation-based...
Proxy Servers
A server that mediates the communications between a client and another server. Proxies often have filtering and tampering capabilities, as well as caching for improved performance. Proxies don't inspect traffic as it passes through like normal firewalls, but i...
Network Security Zones
separate but NOT equal mwahahahaha Effective placement of security appliances depends on segmenting the network into clearly defined areas. This is done using VLANs and subnets, where each segment is it's own broadcast domain. The main unit of a logically segm...
IEEE 802.11ax
even bigger! even better! come on, let's go! never give up! Wifi 6 uses advanced modulation and signal encoding to improve packet transmission speeds by 40%. This grants it the title HE, for high efficiency. The goal for Wifi 6 was to achieve 10G connection sp...
IEEE 802.11ac
i need bigger and better wifi NOW Wifi 5 only works in the 5 GHz band. 2.4 GHz support only works for mixed modes like 802.11b/g/n. The aim for Wifi 5 was to reach Gigabit Ethernet and better. Wifi 5 supports better channel bonding (up to 80 to 160 MHz channel...
IEEE 802.11bg
the second wifi standard of all time (OAT). 802.11b uses the 2.4 GHz frequency band, and was the twin brother of 802.11a on release. It standardized the use of DSSS and CCK signal encoding. While technically inferior to 802.11a with a data rate of 11 Mbps, 802...
IEEE 802.11n
this is a lot of yap for a wifi standard 802.11n increased bandwidth over it's predecessors by multiplexing the signals from 2-4 separate antennae (a radio chain) using MIMO. Radio Chain Radio chains are identified using the AxB:C notation, where: $A$ is the ...
IEEE 802.11a
the first wifi standard of all time i think Wireless radios are configured to use a frequency band, or a section of the radio frequency spectrum. Network appliances and wireless hosts determine what bands are available to them given their adherence to the vari...
Wireless Surveys
i need a map that dictates where all the ______ people are Range, interference, and signal strength all need to be considered when designing a wireless network. Network admins also need to consider device density, device movement, and special traffic requireme...
Wireless Range and Signal Strength
signal jamming but instead it's wifi Wifi-enabled devices should have an indoor range of 100 feet, and double or even triple that for outdoor range. 2.4 GHz better support higher ranges than the 5/6 GHz bands, but clients choose which band to use using the DRS...
Infrastructure Network
i am tired of taking notes let me out of here Wireless Access Points are configured to use a MAC address for each radio usage. If a WAP has a 2.4 GHz radio and a 5 GHz radio, each of them will have a unique MAC address. Devices can join a wireless LAN using th...
Band Steering
yes we need to shut down three lanes of traffic to fix this pothole Many Wifi access points have dual-band or tri-band radios. Clients will use a combination of beacon messages from the access point and their signal strength to choose which band to use. Howeve...
Wifi Encryption Standards
lockdown! lockdown! this is a (maybe) drill! lockdown! lockdown! Wifi networks need to be configured with authentication and encryption settings. Otherwise, any Joe Schmoe can come along and listen to all the traffic happening over the radio waves. Wifi Protec...