How can I only allow employees to connect to our WiFi? Is there a method of authentication against active directory? Is there a guide on setting this up?
Answer Question | September 7, 2010 8:01 PM
Active Directory, Active Directory Permissions, Active Directory security, Network security, Network Security Management, Security in 2010, Wireless security
Is there security testing equipment that will check my wireless and wired network for flaws or defects that would allow it to be taken over or infiltrated?
Answer Question | August 26, 2010 2:36 PM
Network management, Network security, Network Security Management, Wireless in 2010, Wireless network management, Wireless network security, Wireless security
Can we monitor and filter our wireless network? Are there free tools for this? We want to block porn and spyware sites.
Answer Question | September 21, 2011 2:32 PM
Network Security Management, Network Security Policies, Wireless in 2010, Wireless networking, Wireless security
Is there a method for disabling wireless internet from our routers at a specified time every day? When the offices close the wifi closes as well. We have seen some horrible traffic from late nights presumably from the parking lot.
Answer Question | February 22, 2011 2:31 PM
Wireless access, Wireless in 2010, Wireless Internet, Wireless Network, Wireless networking, Wireless security
TZ 100 is keep working but there is no response through http management. Firmware 5521 and 5520 have used but no improvemenet. VPN drops and reconnect all the times. I have adjusted the TCP/IP timeout to 60 Seconds. Unfortunately, it is useless.
Answer Question | August 24, 2010 9:19 AM
Network management, Network security, SonicWALL, TCP/IP, VPN, VPN Error Messages, Wireless in 2010, Wireless security
What methods of assigning wireless encryption codes to our users do we have? I want the process to be automated where they connect to the network and see a web page where they can log in and retrieve their codes. What options do I have?
Answer Question | February 14, 2011 3:13 PM
Encryption, Encryption key management, Encryption Software, Wireless, Wireless connectivity, Wireless in 2010, Wireless Network, Wireless network security, Wireless security
Is it possible to block cell phone activity or wireless broadband cards from being able to function within our server room to prevent data theft? Is there a way to capture what they are trying to send? Can I have activity set off an alarm?
Answer Question | August 18, 2010 1:38 PM
Data Center management, Data Center Security, Server room, Server Security, Wireless in 2010, Wireless security
When I am scanning for wireless networks in my companies head quarters we see all sorts of unsecured outside networks. How can we prevent them from showing up and infiltrating our offices?
Answer Question | August 17, 2010 8:11 PM
Network management, Unsecured Network, Wifi, Wireless in 2010, Wireless Network, Wireless network security, Wireless security
What is the best practice for data encryption? We use wifi and sometimes connect to unsecured networks. How can we use free encryption technology to keep our data safe from prying eyes? Even if someone gets our data I want it to be useless.
Answer Question | August 26, 2010 2:47 PM
Data Encryption, Unsecured Network, Wifi, Wireless Data, Wireless in 2010, Wireless security
Our latest shipment of corporate desktops have wifi. We want the machines only to be able to connect with a wired connection and only via dhcp. Can I do this via group policy and force these options? I want to make sure no one can change the settings manually.
Answer Question | August 13, 2010 1:52 PM
DHCP, Group Policy, Network security, Network Security Management, Wireless in 2010, Wireless security
I have a laptop that has Bluetooth and wifi. My server also has Bluetooth. Can I connect to the server using Bluetooth? Is it more secure than over wifi? Will I be able to open a telnet or mstsc session over Bluetooth or just transfer files?
Answer Question | August 14, 2010 7:55 PM
Bluetooth, MSTSC, Server connectivity, Telnet, Wifi, Wireless in 2010, Wireless security
When connecting to a remote VPN over an unsecured network am I putting the VPN server at risk when transmitting credentials? What is the preferred method of connecting to VPN over unsecured network?
Answer Question | August 12, 2010 2:22 PM
Unsecured Network, VPN, VPN connectivity, VPN security, Wireless connection, Wireless in 2010, Wireless security
When setting up my wireless network at a remote office what steps should I take to make sure it is secure and no one else can access the routers web console and change port forwarding and firewall rules? Is there a check list somewhere?
Answer Question | August 12, 2010 2:19 PM
Remote access security, Wireless in 2010, Wireless Network, Wireless network security, Wireless security
What is the most secure form of wireless security that I can apply from my Belkin 54g router? I want to protect my data on my network as well as make sure no one else is able to access my line.
Answer Question | August 13, 2010 8:34 PM
Belkin, Wireless, Wireless in 2010, Wireless routers, Wireless security
Hi all, I’m looking for ways to keep WiFi access under control in our office. We have a Panera and a other few open hotspots around us, and I just wanted to monitor what was out there and help keep everyone on the right networks. I’ve heard some people used Back Track LiveCD, but wondering [...]
Answer Question | April 2, 2010 5:36 PM
Mobile Computing in 2010, security tools, Wi-Fi, Wi-Fi security, Wireless security
I’ve heard a lot of conflicting reports around whether .11n actually is much more secure than its .11x brethren. Any first-hand experience in starting to deploy it,and any tips on whether I can rest easier at night with it over a Ethernet getup?
Answer Question | March 25, 2010 5:32 PM
802.11n, 802.11n Security, Ethernet, Mobile Computing in 2010, Networking security, Wireless security
A colleague and I were recently debating whether it’s an OK policy to allow wireless access based on users MAC addresses. He has a small office where most people are wired, but a few are wireless and are part of that notorious gang that can’t be bothered with passwords. He also said that basing authentication [...]
Answer Question | April 1, 2010 2:44 PM
MAC address, Mobile Computing in 2010, WEP, Wireless networking, Wireless security
How do I get around the username and password on a Negear WGR614v7 wireless router? Someone else set this up and I do not have the username and password, but need to reset the security on it. Thanks, Dan Maguire email@example.com
Answer Question | March 10, 2010 9:23 PM
Routers, Wireless routers, Wireless security
Do you have an official policy on unauthorized wireless networks in your environment? How do you go about detecting and disabling unauthorized devices, and what are the consequences? How often do you encounter this problem in your business?
Answer Question | February 23, 2010 8:51 PM
Network performance, Network permissions, Network security, Network Security Management, Wireless LAN, Wireless networks, Wireless routers, Wireless security
whats the present researches done about secure routing protocols on 802.11s wireless mesh
Answer Question | January 21, 2010 6:05 PM
802.11s, Wireless networking, Wireless security