Solved

Need recomendation for Wireless Security Authentication beyond WPA...

Posted on 2011-03-23
2
281 Views
Last Modified: 2013-12-09
Greetings EE gods...
I'm being asked to deploy a wireless solution in a business building.
I have the nominal access point security done for WPA through the various access points throughout the building, but I am not feeling comfortable.
I am inquiring on a second level of protection.

Some times, when I log into a Wireless lan, I find myself on a web-based authentication past that in order to get to the network.  Can I get some recommendations for that?
IE...an automatic domain logon, etc....

Thanks
Evan
0
Comment
Question by:Evan Cutler
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 46

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 35202610
The web-authentication you've seen is usually implemented in Guest-Wireless scenarios, where the wireless is completely unsecure (not encrypted).

If the WLAN is for business use only (only employees) you should look at WPA2-Enterprise.  This uses a RADIUS server to authenticate users and can provide extremely secure transmission when used with AES instead of TKIP.

AES is FIPS 140-2 compliant, which basically means the US DoD trusts its integrity and encryption capabilities.

I would look at implementing a firewall for wireless clients in addition to good encryption.
0
 
LVL 9

Author Closing Comment

by:Evan Cutler
ID: 35833409
Thks
0

Featured Post

Do you have a plan for Continuity?

It's inevitable. People leave organizations creating a gap in your service. That's where Percona comes in.

See how Pepper.com relies on Percona to:
-Manage their database
-Guarantee data safety and protection
-Provide database expertise that is available for any situation

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question