This document seeks to gather a set of best practices in configuration, management and safe operation of networks connected to the Internet. The implementation of these practices minimizes the chances of problems occurring security and eases administration and network resources securely. The recommendations presented are eminently practical and as much as possible, platform independent software and hardware. Most of the principles outlined is generic, its effective implementation requires an administrator to determine how these principles can be implemented on platforms it uses (Cooklev, 2004, pp.78).
Discussion
We start from the assumption that wireless networks ...