Currently, the Wireless Network Security standards and protocols are fall into 3 categories:
Encryption
It use to ensures privacy of data transmitted through the air
It can be done at Layer 2 (WPA2, WPA, WEP, TKIP, AES) or Layer 3 (VPN)
Authentication
It can ensures that only authorized users with proper credentials are allowed to use the network such as security certificate or LDAP matching attribute (login and password).
Authentication methods include EAP, captive portal, VPN
Access Control
Provides a policy enforcement structure to control the traffic of authorized users, including networks, bandwidth, time of day, and protocols. Some solutions preferred to integrate with Network Access Control (NAC) supported appliance for managing the access control.
Showing posts with label AES. Show all posts
Showing posts with label AES. Show all posts
January 28, 2009
October 17, 2008
Wireless Security Overview
Wireless security standards and protocols fall into 3 categories
Encryption
Ensures privacy of data transmitted through the air
Can be done at Layer 2 (WEP, TKIP, AES) or Layer 3 (VPN)
Authentication
Ensures that only authorized users with proper credentials are allowed to use the network
Authentication methods include EAP, captive portal, VPN
Access Control
Provides a policy enforcement structure to control the traffic of authorized users, including networks, bandwidth, time of day, and protocols
Encryption
Ensures privacy of data transmitted through the air
Can be done at Layer 2 (WEP, TKIP, AES) or Layer 3 (VPN)
Authentication
Ensures that only authorized users with proper credentials are allowed to use the network
Authentication methods include EAP, captive portal, VPN
Access Control
Provides a policy enforcement structure to control the traffic of authorized users, including networks, bandwidth, time of day, and protocols
Labels:
AES,
EAP,
TKIP,
WEP,
wireless security
Subscribe to:
Posts (Atom)