Solved

Need recomendation for Wireless Security Authentication beyond WPA...

Posted on 2011-03-23
2
274 Views
Last Modified: 2013-12-09
Greetings EE gods...
I'm being asked to deploy a wireless solution in a business building.
I have the nominal access point security done for WPA through the various access points throughout the building, but I am not feeling comfortable.
I am inquiring on a second level of protection.

Some times, when I log into a Wireless lan, I find myself on a web-based authentication past that in order to get to the network.  Can I get some recommendations for that?
IE...an automatic domain logon, etc....

Thanks
Evan
0
Comment
Question by:Evan Cutler
2 Comments
 
LVL 45

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 35202610
The web-authentication you've seen is usually implemented in Guest-Wireless scenarios, where the wireless is completely unsecure (not encrypted).

If the WLAN is for business use only (only employees) you should look at WPA2-Enterprise.  This uses a RADIUS server to authenticate users and can provide extremely secure transmission when used with AES instead of TKIP.

AES is FIPS 140-2 compliant, which basically means the US DoD trusts its integrity and encryption capabilities.

I would look at implementing a firewall for wireless clients in addition to good encryption.
0
 
LVL 9

Author Closing Comment

by:Evan Cutler
ID: 35833409
Thks
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
slow vpn connection 9 63
cmd: can't connect using netsh command 14 87
New firewall implementation guidance 12 57
How do You Stop a DDoS Attack 7 26
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
As technology users and professionals, we’re always learning. Our universal interest in advancing our knowledge of the trade is unmatched by most industries. It’s a curiosity that makes sense, given the climate of change. Within that, there lies a…
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now