57 | |
|
|
Chapter 9: Configuring Security
The following sections describe how to configure Security settings on the
∙Understanding Security Issues on Wireless Networks
∙How Do I Know Which Security Mode to Use?
∙Comparison of Security Modes for Key Management, Authentication and Encryption Algorithms
∙Does Prohibiting the Broadcast SSID Enhance Security?
∙Navigating to Security Settings
∙Configuring Security Settings
∙Updating Settings
Understanding Security Issues on Wireless Networks
Wireless mediums are inherently less secure than wired mediums. For example, an Ethernet NIC transmits its packets over a physical medium such as coaxial cable or twisted pair. A wireless NIC broadcasts radio signals over the air allowing a wireless LAN to be easily tapped without physical access or sophisticated equipment. A hacker equipped with a laptop, a wireless NIC, and a bit of knowledge can easily attempt to compromise your wireless network. One does not even need to be within normal range of the access point. By using a sophisticated antenna on the client, a hacker may be able to connect to the network from many miles away.
The
See also the related topic, “Appendix A: Security Settings on Wireless Clients and RADIUS Server Setup”.
How Do I Know Which Security Mode to Use?
In general, we recommend that on your Internal network you use the most robust security mode that is feasible in your environment. When configuring security on the access point, you first must choose the security mode, then in some modes an authentication algorithm, and whether to allow clients not using the specified security mode to associate.
That said, however, security may not be as much of a priority on some types of networks. If you are simply providing internet and printer access, as on a guest network, setting the security mode to None