Toggle navigation
Home
Networking
Wireless lan security
Chapter 1. Securing WLANs Overview
WLAN: A Perspective
Wireless LAN Components and Terminology
WLAN Standards
WLAN Security
WLAN Security Domain Conceptual Model
Navigating this Book and Chapter Contexts
Summary
Chapter 2. Basic Security Mechanics and Mechanisms
Security Mechanics
Authentication and Identity Protocols
Summary
Chapter 3. WLAN Standards
Standards Organizations, Position, Context, and Influence
Hardware/Radio/Waves and Modulation
FCC Regulations
Brief Discussion on Relevant Standards
Summary
Chapter 4. WLAN Fundamentals
WLAN: Elements and Characteristics
WLAN Basic Topology
WLAN Building Blocks
WLAN State Diagram
Basic Choreography
Summary
Chapter 5. WLAN Basic Authentication and Privacy Methods
Authentication Mechanics
Open Authentication
MAC-Based Authentication
Shared-Key Authentication
WEP Privacy Mechanics
Summary
Chapter 6. Wireless Vulnerabilities
Attacker Objectives
Reconnaissance Attacks
DoS Attacks
Authentication Attacks
WEP Keystream and Plaintext Recovery
WEP Key Recovery Attacks
Attacks on EAP Protocols
Rogue APs
Ad-Hoc Mode Security
Summary
Chapter 7. EAP Authentication Protocols for WLANs
Access Control and Authentication Mechanisms
EAP
PEAP
802.1x: Introduction and General Principles
Cisco LEAP (EAP-Cisco Wireless)
EAP-FAST
Summary
Chapter 8. WLAN Encryption and Data Integrity Protocols
IEEE 802.11i
Encryption Protocols
Key Management
WPA and Cisco Protocols
Security Problems Addressed
Summary
Chapter 9. SWAN: End-to-End Security Deployment
Overview of SWAN Security Features
WLAN Deployment Modes and Security Features
SWAN Infrastructure Authentication
Radio Management and Wireless Intrusion Detection
SWAN Fast Secure Roaming (CCKM)
Local 802.1x RADIUS Authentication Service
Summary
Chapter 10. Design Guidelines for Secure WLAN
WLAN Design Fundamentals
General Security Recommendations
New WLAN Deployments
Integration with Existing WLAN Deployments
SWAN Central Switch Design Considerations
Admission Control Design
Summary
Chapter 11. Operational and Design Considerations for Secure WLANs
Rogue AP Detection and Prevention
WLAN Services Scaling
Enterprise Guest Access
Summary
Chapter 12. WLAN Security Configuration Guidelines and Examples
Cisco Enterprise Class Wireless LAN Products
WLAN Security Methods: Configuration Guidelines and Examples
SWAN Nonswitching Deployment: Configuration Guidelines and Examples
Securing Bridge-to-Bridge Links
Secure WLAN Management Configuration Guidelines
SWAN Central Switching Deployment: Configuration Guidelines and Examples
Summary
Chapter 13. WLAN Deployment Examples
Large Enterprise Deployment Examples
Vertical Deployment Examples
Small and Medium Businesses and SOHO WLAN Deployments
Hotspot (Public WLAN) Deployment Examples
Summary
Appendix A. Resources and References
General Tools
Defensive Tools
Cryptography and Cryptanalysis
Wireless Standards and Associations
Remember the name: eTutorials.org
Copyright eTutorials.org 2008-2024. All rights reserved.