|< Day Day Up >|| |
Before taking the exam, review the key topics and terms that are presented in this chapter. You need to know this information.
Be able to list the risks associated with wireless networks, and be able to assess the ability for an organization to mitigate those risks.
Know the various authentication and encryption protocols available to protect wireless networks.
Be able to explain the significance of a RADIUS sever for improving the security of wireless networks.
Know how to configure Certificate Services to issue certificates for wireless clients.
Know how to configure an IAS server to act as a RADIUS server for a WAP.
Be able to configure one or many wireless clients to use authentication and encryption.
dynamic WEP A term used to describe WEP when it has been configured to automatically change the shared secret in order to limit the amount of encrypted data an attacker can capture for cryptanalysis.
Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) An authentication method that enables clients to authenticate by using a public key certificate.
Protected Extensible Authentication Protocol (PEAP) A two-phase authentication method that protects the privacy of user authentication by using TLS.
Remote Access Dial-In User Server (RADIUS) A standardized service that network equipment, such as a WAP, can use to authenticate users.
Service Set Identifier (SSID) The name of the wireless network that is used by the client to identify the correct settings and credential type to use for this wireless network.
shared secret The password that the wireless clients, the WAP, and often the RADIUS server have access to. The shared secret is used to build the encryption key.
static WEP A term used to describe the traditional implementation of WEP, in which a shared secret is manually configured and does not change on a regular basis.
Transport Layer Security (TLS) A method for encrypting tunneled traffic to protect the privacy of communications.
Wi-Fi Protected Access (WPA) A method for encrypting wireless communications that improves upon the privacy provided by WEP.
Wired Equivalent Privacy (WEP) A method for encrypting wireless communications that is standardized and widely deployed, but that suffers from serious well- exploited vulnerabilities.
|< Day Day Up >|| |