Solved

Need recomendation for Wireless Security Authentication beyond WPA...

Posted on 2011-03-23
2
271 Views
Last Modified: 2013-12-09
Greetings EE gods...
I'm being asked to deploy a wireless solution in a business building.
I have the nominal access point security done for WPA through the various access points throughout the building, but I am not feeling comfortable.
I am inquiring on a second level of protection.

Some times, when I log into a Wireless lan, I find myself on a web-based authentication past that in order to get to the network.  Can I get some recommendations for that?
IE...an automatic domain logon, etc....

Thanks
Evan
0
Comment
Question by:Evan Cutler
2 Comments
 
LVL 45

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 35202610
The web-authentication you've seen is usually implemented in Guest-Wireless scenarios, where the wireless is completely unsecure (not encrypted).

If the WLAN is for business use only (only employees) you should look at WPA2-Enterprise.  This uses a RADIUS server to authenticate users and can provide extremely secure transmission when used with AES instead of TKIP.

AES is FIPS 140-2 compliant, which basically means the US DoD trusts its integrity and encryption capabilities.

I would look at implementing a firewall for wireless clients in addition to good encryption.
0
 
LVL 9

Author Closing Comment

by:Evan Cutler
ID: 35833409
Thks
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article explains in simple steps how to renew expiring Exchange Server Internal Transport Certificate.
How important is it to take extra precautions to protect your online business? These are some steps you can take to make sure you're free of any cyber crime.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now