Access Controls over A LAN
Access controls widely used in LAN networks
This is a control model that enables network users to encrypt information so that no one else read. The feature normally is accompanied by cryptographic key; therefore, the only user with the key can decrypt the details to get full access. Therefore, the encryption offers stronger and advanced access protection.
This is a control model that filters and prevents access between two different networks for instance, contractors, intranet, internet, institutions of higher learning and others. Secure firewalls also permit internal users to explore exterior networks while securing internal systems. In the event of such, any illegal intruder is blocked out of the internet.
This is a control strategy that enables users to access the network by authenticating the source Media Access Control address to the utilized port. The feature doesn’t require the software of the client while owners do not need a password or a username to access the network. The appliance leads to authentication of MAC procedure after detecting any MAC address strange source on the networking port. Therefore, only one user can pass the confirmation access to the network.
Less useful controls
Assigning a static IP address
This kind of control has been utilized in many homes that need IP address. Generally, an IP address is configured on access points or the router after by the Dynamic Host Configuration Protocol (DHCP) is turned off. Afterwards, every other instrument that is connected is also organized to match with the router. This is a very weak way to control network access because intruders can easily access IP address from the network.
Turning off the network when not in use
This is a method that is usually utilized in wireless networks where a user shuts down the network if not in use. Hackers therefore cannot access the network when shut but in the long run, computer hard drives break down because of the deterioration of power cycle.
Considerations one may have in mind
I would love to apply an access control system in my organization to prevent any unauthorized use of network resources. The system will be designed to grant authorized users only access to the internet as well as its resources. To cope with the best network access control method, I will have to consider the following factors
- Eavesdropping susceptibility
- Exposure to intruders
- Integrity of clients
- Network segmentation