05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Lesson 3 Configuring Wireless Connections<br />

15-35<br />

Typically, the convenience of using SSID broadcasting outweighs the slight security<br />

advantage that disabling broadcasting offers.<br />

Note Several tools exist that can help users locate wireless networks, even if SSID broadcasting<br />

is turned off. As an administrator, you can use these tools to help evaluate the security<br />

of your own wireless network and identify rogue wireless networks in your organization.<br />

Two popular tools include NetStumbler, which you can find at http://www.netstumbler.com,<br />

and AirSnare, which you can find at http://home.comcast.net/~jay.deboer/airsnare.<br />

Wired Equivalent Privacy (WEP)<br />

Wired networks normally require a physical connection in order to be compromised.<br />

In wireless networks, because the data is broadcast using radio, intruders can intercept<br />

the signals. If those signals are not encrypted, intruders can view the data being transmitted.<br />

Wired Equivalent Privacy (WEP) is one of two wireless encryption standards<br />

supported by Windows XP Professional (the other being Wi-Fi Protected Access, which<br />

is covered in the next section). WEP is the encryption standard that is specified by the<br />

IEEE 802.11 standard.<br />

WEP provides encryption services to protect authorized users of a wireless LAN from<br />

eavesdroppers. WEP functions by using a shared key to encrypt packets of data before<br />

transmitting them over a wireless network. This shared key is generated by using<br />

40-bit or 64-bit secret key encryption, and then adding a 24-bit initialization vector (IV)<br />

to the end of that key. The shared key is set in place for a network, but a new IV is generated<br />

randomly for each packet of data that is transmitted over the network.<br />

Unfortunately, WEP is not as strong as its designers had hoped. There are two basic<br />

shortcomings in the standard WEP protocol:<br />

■ Most networks do not change the shared key often because the basic WEP standard<br />

does not provide a way to dynamically assign the shared key to APs and stations.<br />

Instead, administrators must manually enter the shared key.<br />

Note To make cracking WEP more difficult, most AP vendors avoid using a handful of<br />

known-weak IVs that cracking tools specifically look for. When these IVs are disabled (by<br />

default for most up-to-date APs) and 128 bit encryption is used, WEP is actually a very secure<br />

encryption protocol. A newer implementation of WEP, known as Dynamic WEP, is designed to<br />

address the problem with manual entry of the shared key. Although Dynamic WEP is much<br />

more secure than WEP, the newer and stronger WPA standard and the bad reputation that WEP<br />

has gained probably means that Dynamic WEP will not gain wide acceptance.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!