16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Implementing Advanced <strong>Wireless</strong> <strong>Security</strong> 555<br />

Figure 21.69 : Configuring LEAP options for domain authentication<br />

Software’s Steel Belted Radius, is an ideal and very robust security solution for a wireless<br />

network of any size. By forcing users to authenticate to a back-end RADIUS server and<br />

creating per-user, per-session dynamic WEP keys, LEAP provides greatly enhanced<br />

authentication and security for your wireless network.<br />

LEAP addresses all WEP’s vulnerabilities and is being implemented into the 802.11b<br />

standard by the Wi-Fi Alliance ( www.wi-fialliance.org ), which has implemented LEAP<br />

into its standards under the name of Wi-Fi Protected Access (WPA). You can read more<br />

about WPA at the Wi-Fi Alliance Web site. In addition, Cisco has licensed the LEAP<br />

technology to several third-party vendors, so you can expect to see many more<br />

LEAP-compatible devices in the near future. For example, Apple’s AirPort network<br />

adapter already supports LEAP with version 2 or better firmware.<br />

21.6 Understanding and Configuring 802.1X RADIUS<br />

Authentication<br />

To provide better security for wireless LANs, and in particular to improve the security of<br />

WEP, a number of existing technologies used on wired networks were adapted for this<br />

purpose, including:<br />

●<br />

Remote Authentication and Dial-In User Service (RADIUS). Provides for<br />

centralized authentication and accounting.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!