Chapter 10
Wireless Security
About This Chapter
The amazing usefulness of new wireless network devices has fueled their sudden and rapid widespread adoption. As with all sudden changes in the fabric of networks, the benefits of new technology often precede real security by a period of time. Wireless devices have created a new vector that allows hackers to attack private networks. Although these attacks are usually against targets of opportunity and perpetrated merely to gain Internet access, they also provide the means for malicious users to attach to your network without worrying about the physical security you employ.
Security standards for wireless protocols are still evolving, which is creating a moving target for vendors and users alike in their efforts to secure this new capability. The existing security standard for encryption in wireless devices, Wired Equivalent Privacy (WEP), is being replaced by the newer 802.1x port authentication protocol. Both technologies are discussed in detail in this chapter.
Make sure you know how to secure a wireless access point by using Wired Equivalency Protocol.
Before You Begin
To accomplish the exercises in this chapter, you'll need relatively expensive hardware. If you don't have this hardware, you should still read through the exercises to learn how wireless devices are configured for security.
To follow the lessons in this chapter, you must have
The domain.Fabrikam.com Microsoft Windows 2000 domain controller
A wireless access point that supports the 802.1x protocol
A laptop computer running Microsoft Windows XP with a wireless network adapter
To complete the lessons in this chapter exactly as written, you will need
The domain.Fabrikam.com Windows 2000 domain controller
An Intel PRO/Wireless 5000 LAN Access Point with the latest firmware
A Windows XP client laptop
A Windows 2000 client
A Tribeca Technologies' Proxim Harmony 802.11a CardBus Card network adapter