content










Content










3.3


Wireless Media
 


 

3.3.7


Wireless security
 





As previously discussed in this chapter,
wireless security can be difficult to achieve. Where wireless networks
exist there is little security. This has been a problem from the
earliest days of WLANs. Currently, many administrators are weak in
implementing effective security practices.
A number of new security solutions and
protocols, such as Virtual Private Networking (VPN) and Extensible
Authentication Protocol (EAP) are emerging. With EAP, the access point
does not provide authentication to the client, but passes the duties to
a more sophisticated device, possibly a dedicated server, designed for
that purpose. Using an integrated server VPN technology creates a tunnel
on top of an existing protocol such as IP. This is a Layer 3 connection
as opposed to the Layer 2 connection between the AP and the sending
node.

EAP-MD5 Challenge
Extensible
Authentication Protocol is the earliest authentication type, which is
very similar to CHAP password protection on a wired network.

LEAP (Cisco)
Lightweight Extensible
Authentication Protocol is the type primarily used on Cisco WLAN
access points. LEAP provides security during credential exchange,
encrypts using dynamic WEP keys, and supports mutual authentication.

User authentication
Allows only
authorized users to connect, send and receive data over the wireless
network.
Encryption
Provides encryption
services further protecting the data from intruders.
Data authentication
Ensures the
integrity of the data, authenticating source and destination devices.


VPN technology effectively closes the
wireless network since an unrestricted WLAN will automatically forward
traffic between nodes that appear to be on the same wireless
network. WLANs often extend outside the perimeter of the home or office
in which they are installed and without security intruders may
infiltrate the network with little effort. Conversely it takes minimal
effort on the part of the network administrator to provide low-level
security to the WLAN.

















 



Web Links


The Guts of WLAN Security Policy

http://www.80211-planet.com/tutorials/ article.php/ 149915










     








Wyszukiwarka