Solved

Wireless Security

Posted on 2006-11-02
6
296 Views
Last Modified: 2010-04-11
I need to make security recommendations for the following wireless-setup.  

ACS Server: Cisco Secure ACS 3.3
Access Point: Cisco AP 1242 AG
Controller: WCS 4400

Please let me know what is the most secure settings including encrytion etc for the above scenario. The compnay is looking to move towards RSA tokens for authnetication and already has Novell LDAP Directory server in place for authnetication.  these 2 pieces can be made part of the security solution.  

any related security advice and links to deploy secure wireless infrastructure will be much appreciated.

Thanks,
Net-Geek
0
Comment
Question by:net-geek
6 Comments
 
LVL 13

Accepted Solution

by:
mrroonie earned 25 total points
ID: 17865970
0
 
LVL 4

Assisted Solution

by:Smacky311
Smacky311 earned 25 total points
ID: 17866158
Heres the notes I took for my Security+ related to wireless..may help some.

Passive attacks on wireless simply view the data going through it (Sniffing or wardriving).  NetStumbler, a wireless network detector find networks then they are captured with Microsoft's network monitor or Linux's TCPDump.  Radio frequency spectrum analyzers can detect networks with hidden SSIDs then sniffers like Wild Packet's AiroPeek can decode and capture packets.  Active attacks generally have a militious intent.  Attackers can setup a rogue AP with a strong antenna and this can be used to discover the secret key being used for authentication.  NetStumbler and AiroPeek can be used to find rogue APs.

WLAN site surveys test wireless setups to make sure they work.  Site survey forms grab address of site, coverage required, type of existing WLAN, ceiling heights, usage of other radio technologies, availability of ladders and other access equipment.  You walk around a building after setting up AP's and measure signal strength and achieveable data rate.  Different antenna may help.  Mark coverage area on floor plan of building.  AP's should operate on different channels.  WLAN surveys should be done during normal business hours.  Even opening/closing doors affects signals.  You should be able to mount and power AP's w/o the need to depend on existing building services.  Your report should be very detailed and include antenna position.  
0
 
LVL 9

Expert Comment

by:paradoxengine
ID: 17877530
Before anything else, make sure to check some 802.1x solutions!
0

Featured Post

Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Port Forwarding on Juniper SSG 140 Firewall 13 70
What is harden windows 10 for security? 5 97
Mac-address sticky 12 46
EXCHANGE 2007, EXCHANGE 2013 8 27
It’s a strangely common occurrence that when you send someone their login details for a system, they can’t get in. This article will help you understand why it happens, and what you can do about it.
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
I designed this idea while studying technology in the classroom.  This is a semester long project.  Students are asked to take photographs on a specific topic which they find meaningful, it can be a place or situation such as travel or homelessness.…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now