Security for WISP through Mikrotik equipment

W. Pauzhi, J. Coronel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This document describes the different attacks that a WISP (Wireless Internet Service Provider) company is exposed to provide last mile services wireless, according to which it designs and implements a security policy based on the requirements and demands presented by this type of scenarios using Mikrotik equipment.

Original languageEnglish
Title of host publicationCHILECON 2015 - 2015 IEEE Chilean Conference on Electrical, Electronics Engineering, Information and Communication Technologies, Proceedings of IEEE Chilecon 2015
EditorsMario F. Fernandez, Gaston H. Lefranc, Ricardo Perez
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages229-233
Number of pages5
ISBN (Electronic)9781467387569
DOIs
StatePublished - 4 Feb 2016
Externally publishedYes
EventIEEE Chilean Conference on Electrical, Electronics Engineering, Information and Communication Technologies, CHILECON 2015 - Santiago, Chile
Duration: 28 Oct 201530 Oct 2015

Publication series

NameCHILECON 2015 - 2015 IEEE Chilean Conference on Electrical, Electronics Engineering, Information and Communication Technologies, Proceedings of IEEE Chilecon 2015

Conference

ConferenceIEEE Chilean Conference on Electrical, Electronics Engineering, Information and Communication Technologies, CHILECON 2015
Country/TerritoryChile
CitySantiago
Period28/10/1530/10/15

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

Keywords

  • Cyber-attacks
  • Radius
  • Security networks
  • Wireless networks
  • WISP

Fingerprint

Dive into the research topics of 'Security for WISP through Mikrotik equipment'. Together they form a unique fingerprint.

Cite this