Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Need recomendation for Wireless Security Authentication beyond WPA...

Posted on 2011-03-23
2
Medium Priority
?
283 Views
Last Modified: 2013-12-09
Greetings EE gods...
I'm being asked to deploy a wireless solution in a business building.
I have the nominal access point security done for WPA through the various access points throughout the building, but I am not feeling comfortable.
I am inquiring on a second level of protection.

Some times, when I log into a Wireless lan, I find myself on a web-based authentication past that in order to get to the network.  Can I get some recommendations for that?
IE...an automatic domain logon, etc....

Thanks
Evan
0
Comment
Question by:Evan Cutler
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 47

Accepted Solution

by:
Craig Beck earned 2000 total points
ID: 35202610
The web-authentication you've seen is usually implemented in Guest-Wireless scenarios, where the wireless is completely unsecure (not encrypted).

If the WLAN is for business use only (only employees) you should look at WPA2-Enterprise.  This uses a RADIUS server to authenticate users and can provide extremely secure transmission when used with AES instead of TKIP.

AES is FIPS 140-2 compliant, which basically means the US DoD trusts its integrity and encryption capabilities.

I would look at implementing a firewall for wireless clients in addition to good encryption.
0
 
LVL 9

Author Closing Comment

by:Evan Cutler
ID: 35833409
Thks
0

Featured Post

Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question