But you may ask, what security measures NoCat has added to our wireless network! ... Wireless Network Security: NoCat. NoCat, mainly will only give the ...
60-564 Security and Privacy in the Internet
Dr. A. K. Aggarwal
Aniss M Zakaria
Tuesday, November 2, 2004
Securing Wireless Network :
Hardware requirements: - Any PC or Server with x86 architecture.
- Two NICs.
- 10 GB free hard drive space.
- At least 256 RAM.
Note: NoCat currently installed on Sun Server with x86 architecture with 2 processors, 2 GB RAM and 36 GB of Hard drive space connected to the main CS router using a routable (real) IP on one NIC while the other NIC connect all access points (AP) using non-routable IPs (192.168.137/24).
We are using Fedora Core 2 as an Operating system.
- Linux (preferably Red Hat or Fedora).
- Apache, MySQL and PERL.
- DHCP and DNS.
- NoCatAuth. Source Code, no binaries!
obtained from http://www.nocat.net
My tests done on Windows XP with SP2, but actually we have test almost every platform!
After contacting the NoCat server, the first thing it will issue an IP to the machine, even before authenticating occurs.
Once you got an IP, open your favorite Internet Browser like IE or FireFox.
If username and password were entered correctly, you will be directed after the following page to your default home page.
This page will stay for 5 seconds!
Please allow popup for this site, or it will ask you for authenticating every 30 minutes.
But you may ask, what security measures NoCat has added to our wireless network! As it did not enable Encryption or MAC address Filtering?!
So why we need it!?
NoCat, mainly will only give the feelings that your network is under control, as the users will think twice before they miss around, as they already has given their own user name, so they feel that they are monitored, which is true!, NoCat provides a nice monitoring page which can help determining who Is online, when s/he logged in and some extra information like machine MAC address and current IP address.