Question

  • Creator
    Topic
  • #2150195

    Wireless Security Software

    Locked

    by swisstonihasher ·

    Hi there,

    Has anyone had experience of locking down XP SP2 wireless connections to specific wireless networks. I’ve tried Group Policy etc and cant see a way to just setup users to have access to Wireless networks 1,2 and 3 but not browse and connect to any others.

    If possible, can this software also detect loops when Wireless is enabled and ethernet cable connected at the same time?

All Answers

  • Author
    Replies
    • #2913130

      Clarifications

      by swisstonihasher ·

      In reply to Wireless Security Software

      Clarifications

    • #2913125

      XP itself will detect a ‘loop’ because it won’t work.

      by older mycroft ·

      In reply to Wireless Security Software

      Unless a wireless-bridge has been constructed within the network connections, it is impossible to connect to either ethernet OR wireless when they are both live, as there is no protocol as to which connection has priority.

    • #2913115

      XP by it’s very nature is impossible to Secure in any real form

      by oh smeg ·

      In reply to Wireless Security Software

      WiFi Networking is just an extension of this and no it’s not possible to prevent a NB from logging onto the incorrect WiFi Network at the moment.

      Even if it was possible it would need to be done on the individual NB and not from a Server. You may be able to limit the ability to create new WiFi Accounts by limiting the User Rights but as this is not something that I’ve ever tried I’m not sure if it is even possible.

      Here the real problem is the way that the Network has been allowed to grow out of control that is causing the potential Security Breach here. If you where to prevent the WiFi Users from actually doing anything locally on their NB instead of working on the server you wouldn’t need top even try to achieve this. It would be much better to lock down your WiFi Access Points to prevent unauthorized Computers Logging In and then proceed to implement a Stronger Security Model preventing any Company Data being moved to the computers locally.

      Col

Viewing 2 reply threads