i lab Create your own user requirements that are reasonable and typical for a SOHO. ilab 2 is attached

SOHO WIRELESS 7









Network Security

05/13/2017














SOHO Wireless

SOHO wireless network is commonly used nowadays in small offices and business enterprises. With this network, a policy statement, the processes, and procedures that can be used to drive the design, implementation, and maintenance of a wireless network in a SOHO. The SOHO Wireless Network is the single or home office local area network that serves few people. It might be an assortment of wired computers systems designed for small institutions. The virtual network has common connecting devices. For instance, it must have a router since they significantly identify IP address through computer devices, so eight contain an inbuilt firewall system to prevent malicious attacks emerging from shared files or computer networks. Furthermore, it is essential to have a network card, an adapter, and a cable to enhance sharing of records when the single computer server accesses the network and sharing of records. Besides, a modem is important in receiving and communicating the signal from the internet service provider. The network cable links the modem and router as long as it is appropriately fixed.

Each computer should have a cable particularly, 10 base T and 100 base T used for connecting computers. The universal length is often 100 meters or about 328 feet, but should not be too short or long for it might cause trouble. The length of the cable ought to be three feet but quality with categories above 5.Furthermore, the cable wire should probably be copper clad aluminum; hence they carry video, data or audio information. Alternatively, solid core and PVC jacket cable can serve well.

Key Network Requirements

There is need for a hardware containing an Ethernet adapter for each connected computer. Every other device should be compatible with 100 base T equipment. Where the ten base T adapter cards are existent, the hub should be 10/100 dual speed. The Ethernet hub should have more ports compared to the number of devices that facilitate the network. In the case where there is older equipment the dual speed hub. The adapter cards must be compatible with operating system and the installed hardware device (Cisco). PCI adapters of NE2000 clones are the most suitable operating with LINUX operating system. On the other hand, Wireless Network Interface Card fosters internet connectivity while the Wireless Access point serves as the focal receiver of the virtual device.

Consideration of the environment when installing network and other related issues is necessary. Environmental wise, the area of choice should be proper, free from flooding and highly humid, for cold setting are unfitting for this. Where network, design, and structure wireless are there should be the reflection of radio waves in a unique way. There should also be an Uninterrupted Power Supply for normal functioning. Their limitation in the device is the redundancy, rigidity, environmental conditions, alongside the speed and brand breadth challenges.

The SOHO wireless network setting and physical conditions

The key users of the SOHO must be the top managers and IT committee. The network security requires that there be remote management over the internet for the embedded web servers cause flaws. According to Young (2013), configuration of NAT rules permits easy connectivity. Additionally, default passwords are similar in the whole product line for they are generated from conventional algorithm creating prey for the attacker. Moreover, default IP ranges, which are predictable, make CSRS easy for attack just as the forgetting logging out after router configuration exposes people to attack. The last risk emanates from the running of an open or WPS enhanced wireless network.

Wireless network security policy statement.

Given that with HOMO security is essential, all executives are required to take charge of the security. There is need to mitigate security of home routers though password, username, default SSID. Besides, the WLAN coverage, Universal Plug and Play, firmware and remote upgrade must be prioritized by the departments within the company. Furthermore, data confidentiality must be highlighted among the all managing individuals within the enterprise. The stability, integrity, performance, should be convenient, flexible, and ubiquitous; thus installation process must be intercepted and maintained well.

As the central support entity for the business wired and wireless data networks, IT is allotted the responsibility and authority regarding the disposition and usage of company leased, operated and owned wireless devices. The wireless local area networks and clients in the business premises and any remote site directly linked with the campus network must conform to all pertinent federal, state, local laws and guidelines.

Wireless Network Security Processes and Procedures Statement

The CIO is to be in charge of the computers, network provision, and cable connectivity. The IT committee should draft rules and policies controlling network and security matters. The wireless connectivity should not be used in the business application (Homeland Security). Furthermore, if there should be a change in the password, it ought to be done particularly from a non-wireless device that is in connectivity with the wired company network. Additionally, it is crucial to turn off any drive that the wireless computer networks share. Where sharing is a must, the files must be shared; a strong password must be applied.























References

Cisco. (n.d.). SOHO Network: Requirements, planning, and implementation. 2017.Retrieved from https://www.examcollection.com/certification-training/network-plus-soho-network-requirements-planning-and-implementation.html

Homeland Security. (n.d.). Small Office/Home Office Router Security. 1-4.Retrieved from https://www.us-cert.gov/sites/default/files/publications/HomeRouterSecurity2011.pdf

Young, C. (2013). Five Tips for Securing SOHO Routers. Vulnerability Management.Retrieved from https://www.tripwire.com/state-of-security/vulnerability-management/five-tips-securing-soho-routers/