16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

556 Chapter 21<br />

●<br />

802.1X. Provides for a method of port-based authentication to LAN ports in a<br />

switched network environment.<br />

These two services are used in combination with other security mechanisms, such as<br />

those provided by the Extensible Authentication Protocol (EAP), to further enhance the<br />

protection of wireless networks. Like MAC filtering, 802.1X is implemented at layer 2<br />

of the Open System Interconnection (OSI) model: it will prevent communication on the<br />

network using higher layers of the OSI model if authentication fails at the MAC layer.<br />

However, unlike MAC filtering, 802.1X is very secure as it relies on mechanisms that are<br />

much harder to compromise than MAC address filters, which can be easily compromised<br />

through spoofed MAC addresses.<br />

Although a number of vendors implement their own RADIUS servers, security<br />

mechanisms, and protocols for securing networks through 802.1X, such as Cisco’s<br />

LEAP and Funk Software’s EAP-TTLS, this section will focus on implementing 802.1X<br />

on a Microsoft network using Internet Authentication Services (IAS) and Microsoft’s<br />

Certificate Services. Keep in mind, however, that wireless security standards are a<br />

moving target, and standards other than those discussed here, such as the PEAP, are being<br />

developed and might be available now or in the near future.<br />

21.6.1 Microsoft RADIUS Servers<br />

Microsoft’s IAS provides a standards-based RADIUS server and can be installed as an<br />

optional component on Microsoft Windows 2000 and Net servers. Originally designed to<br />

provide a means to centralize the authentication, authorization, and accounting for dial-in<br />

users, RADIUS servers are now used to provide these services for other types of network<br />

access, including VPNs, port-based authentication on switches, and, importantly, wireless<br />

network access. IAS can be deployed within Active Directory to use the Active Directory<br />

database to centrally manage the login process for users connecting over a variety of<br />

network types. Moreover, multiple RADIUS servers can be installed and configured so<br />

that secondary RADIUS servers will automatically be used in case the primary RADIUS<br />

server fails, thus providing fault tolerance for the RADIUS infrastructure. Although<br />

RADIUS is not required to support the 802.1X standard, it is a preferred method for<br />

providing the authentication and authorization of users and devices attempting to connect<br />

to devices that use 802.1X for access control.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!