13.01.2013 Views

Dummies, Wireless

Dummies, Wireless

Dummies, Wireless

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 9: Securing Your <strong>Wireless</strong> Home Network<br />

Going for the Ultimate in Security<br />

Setting up your network with WPA security keeps all but the most determined<br />

and capable crackers out of your network and prevents them from doing<br />

anything with the data you sent across the airwaves (because this data is<br />

securely encrypted and appears to be just gibberish).<br />

But WPA has a weakness, at least the way it’s most often used in the home:<br />

the preshared key (your shared secret or passphrase) that allows users to<br />

connect to your network and that unlocks your WPA encryption.<br />

Your preshared key can be vulnerable in two ways:<br />

� If it’s not sufficiently difficult to guess (perhaps you used the same<br />

word for your passphrase as you used for your network’s ESSID): You<br />

would be shocked by how many people do that! Always try to use a<br />

passphrase that combines letters (upper- and lowercase is best) and<br />

numbers and doesn’t use simple words from the dictionary.<br />

� If you’ve given it to someone to access your network and then they<br />

give it to someone else: For most home users, this isn’t a big deal, but if<br />

you’re providing access to a large number of people (maybe you’ve set<br />

up a hot spot), it’s hard to put the genie back in the bottle when you’ve<br />

given out the passphrase.<br />

802.1x: The corporate solution<br />

Another new standard that’s become quite popular<br />

in the corporate Wi-Fi world is 802.1x. This<br />

isn’t an encryption system but, rather, an authentication<br />

system. An 802.1x system, when built into<br />

an access point, allows users to connect to the<br />

access point and gives them only extremely limited<br />

access (at least initially). In an 802.1x system,<br />

the user could connect to only a single network<br />

port (or service). Specifically, the only traffic the<br />

user could send over the network is your login<br />

information, which is sent to an authentication<br />

server that would exchange information (such as<br />

passwords and encrypted keys) with the user to<br />

establish that he or she was allowed on the network.<br />

After this authentication process has been<br />

satisfactorily completed, the user is given full<br />

access (or partial access, depending on what<br />

policies the authentication server has recorded<br />

for the user) to the network.<br />

177

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!