Small office network configuration advice

ggadrian

Senior member
May 23, 2013
270
0
76
Well, as some of you already know I manage the IT of a small network.

So far it's been working fine for almost a year, but I'd like to make some changes to improve performance and security, and to have more options in a future.

The office typically has the following computers:

-1 Server that holds the files, make backups and is used for administrative tasks.
-2 desktops connected by wifi
-2 laptops connected by wifi
-4/5 smartphones
-3 laptops that sometimes are there (although they usually aren't)

And one network printer: HP Officejet Pro 8600

My network gear is:
-ISP router used only as a modem
-TP-Link TL-WR1043ND
-A spare belkin n450
-2 spare Tp-Link TL-PA511 PLC

So, I'm planning to change the firmware of my router to DD-WRT since it will give me more options to configure it.

All the computers are property of the business and I have access to them, I just don't have access to the employees smartphones.

What would you do with that? Something in special that you would do in order to improve security (most important thing), stability or performance?
 

duncan-idaho

Junior Member
Jul 31, 2013
19
0
0
First, I'm not an IT pro. I can see some things you may want to change though - first one that jumps out at me is that you may want to consider remotely administrating your server as normally you will want to physically secure your server (one store I worked at had it in a locked cage). Physical access to the hard drives that store all your important files should be controlled for sure.

I'm not sure exactly what you have in mind when you say "improving security", but if you want to be serious about controlling access to your network and the data on it then you need to consider how secure it is when it is at rest (ie stored on your hard drives), when it is being accessed (who has the permissions to access sensitive documents), when it is being transmitted and worked with (are you using a VPN to encrypt traffic between you and your ISP, or you and any machines accessing your data remotely?) and when you are moving it around (laptops or devices that can access this data -encrypted?) For that matter, are the disks you are storing it on encrypted?

Then there's backups. Do you have an offsite mirror of some kind, rackspace/amazon type cloud backup and if so are these backups secured? How will you respond if your server/network hardware dies and you need to keep the business functioning/recover all the critical data/make it accessible for working with again?

Basically, I think you need to flesh out what you want to do and what is important more if you want good quality, specific advice here.
 

ggadrian

Senior member
May 23, 2013
270
0
76
First, I'm not an IT pro. I can see some things you may want to change though - first one that jumps out at me is that you may want to consider remotely administrating your server as normally you will want to physically secure your server (one store I worked at had it in a locked cage). Physical access to the hard drives that store all your important files should be controlled for sure.

I'm not sure exactly what you have in mind when you say "improving security", but if you want to be serious about controlling access to your network and the data on it then you need to consider how secure it is when it is at rest (ie stored on your hard drives), when it is being accessed (who has the permissions to access sensitive documents), when it is being transmitted and worked with (are you using a VPN to encrypt traffic between you and your ISP, or you and any machines accessing your data remotely?) and when you are moving it around (laptops or devices that can access this data -encrypted?) For that matter, are the disks you are storing it on encrypted?

Then there's backups. Do you have an offsite mirror of some kind, rackspace/amazon type cloud backup and if so are these backups secured? How will you respond if your server/network hardware dies and you need to keep the business functioning/recover all the critical data/make it accessible for working with again?

Basically, I think you need to flesh out what you want to do and what is important more if you want good quality, specific advice here.

I'm asking for network advice. I'm not worried of people physically accessing to the data and I have multiple backups (1 in a separate hard drive inside the server for fast recovery, every week I take a external HDD home with multiple backup images and now I'm setting up a server for backups over internet).

The problem is that I'm really a noob in networking and apart from protecting the wifi with WPA2, doing MAC filtering and only allowing physical access to the router configuration I don't know how to improve security.

Basically I wanna know what would you do if it were your network.
 

duncan-idaho

Junior Member
Jul 31, 2013
19
0
0
I'm asking for network advice. I'm not worried of people physically accessing to the data and I have multiple backups (1 in a separate hard drive inside the server for fast recovery, every week I take a external HDD home with multiple backup images and now I'm setting up a server for backups over internet).

The problem is that I'm really a noob in networking and apart from protecting the wifi with WPA2, doing MAC filtering and only allowing physical access to the router configuration I don't know how to improve security.

Basically I wanna know what would you do if it were your network.
I'd look at encrypting mobile devices that have access to your network and managing users' access to files and resources. Wireless passwords are only as safe as the handling practices protecting them. Someone loses a phone or laptop with saved passwords, that is the ball game and you have to hope they tell you about it in time to change all the passwords, which means in an unmanaged network manually updating everyone's passwords. Time spent now setting this up correctly could prevent an event like someone getting their laptop stolen from becoming a catastrophic event

I know it may seem alarmist considering you seem to be talking about a small scale operation, but it is one of those things that doesn't seem important until it is. Properly securing data, including physical access ie encryption, is important.
 

386DX

Member
Feb 11, 2010
197
0
0
The standard method of securing your Wi-Fi network in a business/enterprise environment is to use a radius server for authentication. One of the reason a standard WPA key or passphrase isn't used is with a radius server every user has there own login/pass, you can add or remove users without effecting other users. In your current setup if someone with your WPA key quits you have to change your WPA key on every device and Access Point to maintain security. There are many other reasons to use a radius server but that's the main one IMO.
 

Lorne

Senior member
Feb 5, 2001
873
1
76
I assume you are small data only and not large file like PSD, Large file work over wifi can become really tedious and choke the network to unbarable speeds.
 

Mushkins

Golden Member
Feb 11, 2013
1,631
0
0
The first thing I would suggest is to ditch the SOHO stuff and get yourself a business class network security appliance that can double as your router. We use Sonicwall gateway devices where I work and they're ok, but the subscription-based features get expensive quick.

Also since everything is wireless, invest in some business-class APs with proper handoff/roaming support. The AT forums swears by Ubiquiti UniFis, I gave them a try and they're pretty good but I dislike the need for management software and prefer a standard web interface.
 

kevnich2

Platinum Member
Apr 10, 2004
2,465
8
76
Well, as some of you already know I manage the IT of a small network.

So far it's been working fine for almost a year, but I'd like to make some changes to improve performance and security, and to have more options in a future.

The office typically has the following computers:

-1 Server that holds the files, make backups and is used for administrative tasks.
-2 desktops connected by wifi
-2 laptops connected by wifi
-4/5 smartphones
-3 laptops that sometimes are there (although they usually aren't)

And one network printer: HP Officejet Pro 8600

My network gear is:
-ISP router used only as a modem
-TP-Link TL-WR1043ND
-A spare belkin n450
-2 spare Tp-Link TL-PA511 PLC

So, I'm planning to change the firmware of my router to DD-WRT since it will give me more options to configure it.

All the computers are property of the business and I have access to them, I just don't have access to the employees smartphones.

What would you do with that? Something in special that you would do in order to improve security (most important thing), stability or performance?

Judging by your post and responses, this is for a very small office network and probably has a budget to match. The one thing I agree with so far is to go with a sonicwall firewall appliance. These are higher priced but have tons of features (if you want to use them). Look at something like tz210 wireless or tz215 wireless on ebay or something (only buy new sealed though).

This will provide you with plenty of features for remote administration if you ever need it, better firewall protection and much better stability than what you currently have.

Another cheaper option is like a high end asus wireless router (forget the exact model number) flashed with shibby tomato. I've had one going solid for 7 mos+ and no reboots and the firmware gives every feature imaginable.

As far as others posting using radius for your wireless - sorry but for a small office network, I have yet to see this actually work correctly. In large companies, that's one thing but not most of the smaller ones I've consulted with.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |