Wireless Network

Posted on 2011-10-17
Last Modified: 2012-06-22

1) This is related to Enterprise wireless network in the production environment.
2) last time, we have to key in the "ssid " and its code ....
3) But the company has changed the wireless system ..
- They do not use the " ssid " anymore .... (I mean I do not need to "key in" the code to every computer anymore
- They use something like --> WPA 2.....or what ? and it is linked to the mac address of the laptop

4) My question: What is the name of this wireless system at # 3? They calll it WPA? or what?


Question by:tjie
    LVL 3

    Accepted Solution

    SSID is the name of the network, there is no thing no SSID, they can hide it and they its not on the "available networks" list, but you can still connect by typing the SSID manually.

    WPA\WPA2 is an encryption method, thats just mean somebody put a password for the network.

    Connected to the MAC address -> that means they use network filtering and "allow list" to manually allow computers to use this network.

    Author Comment

    So what is the name of the encryption method which i have to put the "ssid" (the name of the network) and around 26 digits code?
    LVL 14

    Assisted Solution

    by:Juan Ocasio
    You'll have to ask what type of security they use.  It could be WPA or WPA2.  The SSID as mentioned above is merely the network name.  They are probably no longer broadcasting it so this is why you don't see it.  The SSID could be something like Office_Network, while the key could be something like abcdef1234567890abcdef (This is usually written in hex although you may sometime find one that will allow passphrases).

    To answer you last question, ask what type of encryption they are using; it's probably WPA2


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
    For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
    This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    9 Experts available now in Live!

    Get 1:1 Help Now