Maximizing Wireless Security Through Tunneling


In some cases it might not be feasible to have all the components compliant with your security planning, such as older pre-existing equipment that doesn't support 802.1x, RADIUS, or WPA. You also might not have control over portions of the WLAN to which your clients are connecting.

In these cases the best method for securing your network traffic would be a Virtual Private Network (VPN).

While You're Away

Public Access Points are popping up everywhere. It might be in your local coffee shop or bookstore. This convenience allows remote users and administrators access to their networks from almost anywhere . This convenience also creates challenges for the IT administrators.

Lack of WEP on the public access points means you're exposing your wireless traffic. This makes the use of VPN that much more important.

VPN Pass-through is Important

Not all firewalls allow VPN pass-through. Make sure that the firewall at that location is allowing VPN authentication and tunnels.

If the wireless client is in a public access point, have the user check with the FAQ section of that provider's Web site or call their technical support phone number.



Microsoft Windows Server 2003 Insider Solutions
Microsoft Windows Server 2003 Insider Solutions
ISBN: 0672326094
EAN: 2147483647
Year: 2003
Pages: 325

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net