16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

576 Chapter 21<br />

environment. A primary advantage here is that if a device is stolen, the<br />

certificates it uses can be immediately revoked. The next time it tries to<br />

authenticate, the CRL will be checked and authentication will fail.<br />

●<br />

●<br />

●<br />

An authorization password. This is the shared-secret password you configured<br />

for RADIUS client authentication on the IAS server. This password is used to<br />

establish communication between the AP and the RADIUS server. Thus, it needs<br />

to be protected by being long and complex. This password should be at least 22<br />

characters long and use mixed case, numbers, letters, and other characters. You<br />

might want to consider using a random string generation program to create this<br />

password for you.<br />

An IP address o f a primary and, if confi gured for fault tolerance, a secondary<br />

RADIUS server. If the AP is in a DMZ, and the RADIUS server is behind a<br />

firewall, this IP address can be the external IP address of the firewall.<br />

A UDP port used for RADIUS authentication. The default port for RADIUS is<br />

port 1645. However, you can change this port on the IAS server and the AP for<br />

an additional degree of security.<br />

Depending on your AP, you might have to go through additional configuration steps. For<br />

example, you might have to enable the use of dynamic WEP keys. On the AP 500, this<br />

configuration is automatically applied to the AP when you finish configuring the 802.1X<br />

settings. Consult your AP’s documentation for specific information on configuring it for<br />

802.1X authentication.<br />

21.6.3.4 Configuring the <strong>Wireless</strong> Interface on Windows XP for<br />

802.1X Authentication<br />

If you have been following the preceding steps in the same order for configuring 802.1X<br />

authentication, the final step is to configure the properties of the wireless interface in<br />

Windows XP. You will have to ensure that the properties for EAP-TLS authentication and<br />

dynamic WEP are configured. To do this, perform the following steps:<br />

1. Obtain the Properties of the wireless interface and click the Authentication tab.<br />

2. Ensure that the checkbox for Enable access control for IEEE 802.1X is checked<br />

and that Smart Card or other Certifi cate is selected as the EAP type, as shown in<br />

Figure 21.81 .<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!