3Com 8760 User Guide - Page 89

Security, Wi-Fi Protected Access WPA or WPA2

Page 89 highlights

Security SECURITY The access point is configured by default as an "open system," which broadcasts a beacon signal including the configured SSID. Wireless clients with an SSID setting of "any" can read the SSID from the beacon and automatically set their SSID to allow immediate connection to the nearest access point. To improve wireless network security, you have to implement two main functions: „ Authentication: It must be verified that clients attempting to connect to the network are authorized users. „ Traffic Encryption: Data passing between the access point and clients must be protected from interception and eavesdropping. For a more secure network, the access point can implement one or a combination of the following security mechanisms: „ Wired Equivalent Privacy (WEP) page 4-49 „ IEEE 802.1x page 4-56 „ Wireless MAC address filtering page 4-11 „ Wi-Fi Protected Access (WPA or WPA2) page 4-56 Both WEP and WPA security settings are configurable separately for each virtual access point (VAP) interface. MAC address filtering, and RADIUS server settings are global and apply to all VAP interfaces. The security mechanisms that may be employed depend on the level of security required, the network and management resources available, and the software support provided on wireless clients. A summary of wireless security considerations is listed in the following table. Table 5 Wireless Security Considerations Security Mechanism Client Support Implementation Considerations WEP Built-in support on all 802.11a • Provides only weak security and 802.11g devices • Requires manual key management WEP over 802.1X Requires 802.1X client support • Provides dynamic key rotation for improved WEP in system or by add-in software security (support provided in Windows • Requires configured RADIUS server 2000 SP3 or later and Windows • 802.1X EAP type may require management of XP) digital certificates for clients and server MAC Address Filtering Uses the MAC address of client network card • Provides only weak user authentication • Management of authorized MAC addresses • Can be combined with other methods for improved security • Optionally configured RADIUS server 4-49

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

4-49
Security
S
ECURITY
The access point is configured by default as an “open system,” which broadcasts
a beacon signal including the configured SSID. Wireless clients with an SSID
setting of “any” can read the SSID from the beacon and automatically set their
SSID to allow immediate connection to the nearest access point.
To improve wireless network security, you have to implement two main functions:
Authentication: It must be verified that clients attempting to connect to the
network are authorized users.
Traffic Encryption: Data passing between the access point and clients must be
protected from interception and eavesdropping.
For a more secure network, the access point can implement one or a combination
of the following security mechanisms:
Wired Equivalent Privacy (WEP)
page 4-49
IEEE 802.1x
page 4-56
Wireless MAC address filtering
page 4-11
Wi-Fi Protected Access (WPA or WPA2)
page 4-56
Both WEP and WPA security settings are configurable separately for each virtual
access point (VAP) interface. MAC address filtering, and RADIUS server settings
are global and apply to all VAP interfaces.
The security mechanisms that may be employed depend on the level of security
required, the network and management resources available, and the software
support provided on wireless clients.
A summary of wireless security considerations is listed in the following table.
Table 5
Wireless Security Considerations
Security
Mechanism
Client Support
Implementation Considerations
WEP
Built-in support on all 802.11a
and 802.11g devices
Provides only weak security
Requires manual key management
WEP over 802.1X
Requires 802.1X client support
in system or by add-in software
(support provided in Windows
2000 SP3 or later and Windows
XP)
Provides dynamic key rotation for improved WEP
security
Requires configured RADIUS server
802.1X EAP type may require management of
digital certificates for clients and server
MAC Address
Filtering
Uses the MAC address of client
network card
Provides only weak user authentication
Management of authorized MAC addresses
Can be combined with other methods for
improved security
Optionally configured RADIUS server