Lan-Secure Logo

Lan-Secure Network Blog

Network Management and Security


Find technical networking articles
Use our network management and security blog to find technical articles and knowledge base information about networking related issues.

Lan-Secure Networking Blog

Disable Wireless When Connected to LAN

Wireless today has become a standard interface in every laptop and in most cases it connects automatically to the nearest Access Point it discovers. Most organizations provide unsecured Wireless connectivity to public networks like the internet for their guests through local Wireless Access Points that works in stand alone mode and disconnected completely from organization LAN. However, when a company employee is using his laptop for connecting to the organization LAN the WiFi adapter of the laptop will automatically try to connect to the nearest wireless Access Point. In most cases the nearest wireless Access Point that the employee laptop will discover will be the organization unsecured wireless network. Now, the employee laptop will become the perfect bridge connection to the organization LAN for any potential intruder from the internet or from the local unsecured wireless network. Because of the duplicate connection the employee laptop will consume duplicate network resources and the employee can suffer from unstable network connectivity.

The above scenario is becoming a day by day issue as wireless networks become common standard in every laptop. Lan-Secure Wireless Protector: Disable WiFi Automatically When Connected to LAN has the perfect solution to deal with the organization wireless management and security. The software will automatically disable WiFi adapters on computers that connected to the company network with LAN cable and re-enable WiFi when the LAN cable is disconnected from the computer.

How does it work?
Wireless Protector Software is installed on windows organization platform and all organization laptops need to be added to the protected computers list. The software will scan all protected laptops and using the network administrator username and password will create a service in each remote laptop. The service that installed on the remote laptops will try to communicate with Wireless Protector Software that installed on the organization LAN each time there is a change in the connectivity status of its network adapters. Upon receiving confirmation from the software the remote laptop will automatically disable the WiFi adapter if the laptop LAN cable is connected to the organization network and re-enable it back when the LAN cable is plugged out from the laptop. Wireless Protector Software will verify that the protection service is running on the remote laptops of the organization and collect protection events and WiFi activation status for each laptop.

How does it protect the organization?
A remote computer WiFi will be disabled only when receiving confirmation from Wireless Protector Software that installed on the organization LAN. That mechanism will assure that protected laptops WiFi adapter will be disabled only when it connected to the organization LAN and not in any place outside the organization. When connected to the organization LAN remote protected laptops will disable their WiFi adapter and the remote user will receive notification message about it. Trying to by passing this mechanism manually by the remote user will fail while the remote laptop is connected to the organization LAN. The software will notify the administrator about the protection status of each remote laptop and collect WiFi disabling events from the protected laptops. The software will assure that the organization LAN will be protected from unsecured wireless connections and from duplicate network connections.

Conclusion
Wireless networks are still the most convenient way for fast and easy communication while WiFi adapters became a standard in every laptop. However, keeping wireless networks accessible to public networks leave them unsecured and vulnerable to potential intruder’s attacks. Wireless Protector Software will protect the organization LAN from wireless networks vulnerabilities and still enable to use wireless communication freely and safely.

Network configuration management software

Network configuration management refers to mechanism that allows controlling and maintaining changes of network devices either automatically or by network administrator request. The tasks of network configuration management are setting configuration changes, collecting configuration history, creating configuration backups and restoring configuration of network devices. Network configuration management software should provide generic mechanism that will be able to control any network device and simplify the configuration tasks to reduce configuration errors of network devices.

Lan-Secure Network Configuration Management Software has the perfect solution to deal with any network device configuration by using generic SNMPv1/2 or secured SNMPv3 protocols for collecting network devices configuration. The easy to use software provides integral mechanism for all network configuration management tasks and supports any network environment size.

Network Configuration Collection
Provide automatic and manual option for collecting configuration from any network device. Tools that provided by equipment vendors are not good enough because most networks using several vendors and types of network devices like switches, routers, firewalls and other network devices. Using generic SNMPv1/2 or secured SNMPv3 protocols can provide central network configuration management system for the whole organization.

Network Configuration Changes
Provide automatic and manual option for changing network devices configuration of specific device or as bulk operation on couple devices. The previous network configuration settings will be restored for historical analyzing or reusing and the new configuration will be used as the current network configuration devices. The changes operation will be logged and saved under the name of the new configuration submitter for tracking.

Network Configuration Backup
Create duplicate configuration of all network devices including all the configurable values that were found for each network device. The backup process could be automated for specific dates and times or created by user request. The backup should include incremental and differential configuration settings for each network device.

Network Configuration Restore
Set current stored configuration for specific device in case of malfunctioning equipment or for analyzing specific networking issue that involves with previous configuration settings. The restore operation will be audited and logged under the name of the restore issuer for historical analyzing.

Network Configuration Actions
There are situations that specific action is needed when collecting network configuration of specific device upon discovery of any configuration change or value. The actions should alert the configuration management team about the changes or values that was discovered either by sending email or trap or by performing specific executable command or fixing specific configuration value. Adding actions to network configuration management system can alert or fix faulty configuration equipments before they can cause severe damage to the network.

Conclusion
Since networks in any size are constantly vulnerable to configuration changes and faulty configuration in live equipment can have devastating effects on networks reliability and services, using the above network configuration management tasks as major configuration tool in any network environment can help network administrators saving time and reducing errors while keeping network performance and stability.