UTILITY INSTALLATION AND CONFIGURATION
The security mechanisms that may be employed depend on the level of security required, the network and management resources available, and the software support provided on wireless clients. A summary of wireless security considerations is listed in the following table.
Security | Client | Implementation Considerations | |
Mechanism | Support |
|
|
|
|
|
|
WEP | • | Provides only weak security | |
| 802.11b and 802.11g | • Requires manual key management | |
| devices |
|
|
|
|
| |
WPA mode | Requires | • Provides good security in small | |
| system and network |
| networks |
| card driver | • | Requires configured RADIUS server, |
| (native support provided |
| or manual management of |
| in Windows XP) |
| key |
|
|
| |
| 802.1x mode | • Provides robust security in | |
| Requires |
| mode (i.e., WPA clients only) |
| • Requires configured RADIUS server | ||
| system and network | ||
| card driver | • | 802.1x Extensible Authentication |
| (native support provided |
| Protocol (EAP) type may require |
|
| management of digital certificates for | |
| in Windows XP) |
| |
|
| clients and server | |
|
|
| |
|
|
|
|
16