Designing Access Controls

Choose the Access Control Methods

Table 3-3. Wireless Security

Authentication

Encryption Options

Advantages

Disadvantages

Method

 

 

 

 

 

 

 

Shared key

• Static WEP

Static WEP

Data encryption

Control over which users can send and receive data

Static WEP

Manual maintenance of keys, which are rarely changed

Ability to crack keys if enough frames are collected

No central management for keys on multiple APs

WPA/WPA2 with preshared keys (PSK)

802.1X

• Dynamic WEP

WPA/WPA2

TKIP

CCMP-AES

WPA/WPA2

WPA/WPA2

Weaker authentication

• No need for RADIUS server and

 

802.1X

• Either software upgrades or

Per-frame keys

 

special hardware and

 

software on APs and

Secure distribution and

 

 

stations

 

rotation with TKIP or CCMP

 

 

Increased AP workload,

• Optional AES, which is a very

 

which could decrease

 

secure encryption algorithm

 

 

 

performance

 

 

 

Dynamic WEP

Dynamic WEP

• Generation and distribution of

Per-sessionkeys(the default

 

per-session keys

 

setting) that can be cracked

Secure, centralized

 

with high effort

 

distribution of global keys

• Additional overhead for per-

Key rotation

 

packet keys

User-based authentication

RADIUS required (although

Widely supported

 

some APs, such as the

 

ProCurve AP 530, have an

 

 

 

 

 

 

internal RADIUS server)

 

 

802.1X supplicant required

 

 

 

on endpoints

WPA/WPA2

WPA/WPA2

• Strongest security available for

• Either software upgrades or

 

wireless networks when

 

special hardware and

 

combined with 802.1X

 

software on APs and

Per-frame keys

 

stations

Secure key distribution and rotation with TKIP or CCMP

User-based authentication

Optional AES

Increased AP workload, which could decrease overall performance

RADIUS server required

802.1X supplicant required on endpoints

3-18