wiley & sons - building secure wireless networks with 802.11.pdf
(
6083 KB
)
Pobierz
Building Secure Wireless Networks with 802
Building Secure Wireless Networks with 802.11
Table of Contents
Building Secure Wireless Networks with 802.11............................................................................1
Introduction........................................................................................................................................4
Who Should Read This Book...................................................................................................4
What You Need to Know..........................................................................................................5
How This Book Is Organized...................................................................................................5
Part I: Introduction to Wireless Local Area Networks (LANs).......................................................8
Chapter Lis..............................................................................................................................8
Part Overview.....................................................................................................................8
Chapter 1: Networking Basics........................................................................................................10
Highlights...............................................................................................................................10
Development of Computer Networks: An Overview...............................................................10
Network Types.......................................................................................................................13
Peer−to−Peer Networks...................................................................................................13
Local Area Networks (LANs)............................................................................................13
Wide Area Networks (WANs)...........................................................................................14
Personal Area Networks (PANs)......................................................................................15
The Interne......................................................................................................................15
Virtual Private Networks (VPNs)......................................................................................16
Network Topologies...............................................................................................................16
Three Commonly Used Topologies..................................................................................16
Choosing the Right Topology...........................................................................................18
Network Hardware and Software...........................................................................................18
Networking Components..................................................................................................19
Networking Software........................................................................................................26
Networking Protocol: TCP/IP...........................................................................................27
Putting It All Together............................................................................................................29
Summary................................................................................................................................30
Chapter 2: Wireless LANs...............................................................................................................31
Highlights...............................................................................................................................31
Evolution of Wireless LANs: An Overview.............................................................................31
A Basic Wireless LAN............................................................................................................32
Basic Architecture of a Wireless LAN....................................................................................33
Wireless LAN Adapters....................................................................................................33
Access Points (APs.........................................................................................................39
Wireless LAN Configurations.................................................................................................40
Ad−Hoc Mode..................................................................................................................40
Infrastructure Mode..........................................................................................................40
Distribution Service Systems (DSSs)...............................................................................40
Existing Wireless LAN Standards..........................................................................................42
IEEE 802.11.....................................................................................................................42
IEEE 802.11 b..................................................................................................................42
IEEE 802.11 a..................................................................................................................42
HomeRF...........................................................................................................................42
Bluetooth..........................................................................................................................42
Are Wireless LANs Risks to Health?......................................................................................43
Security Risks........................................................................................................................43
i
Table of Contents
Chapter 2: Wireless LANs
Summary................................................................................................................................43
Chapter 3: The Institute of Electrical and Electronics Engineers (IEEE) 802.11 Standards.....44
Overview................................................................................................................................44
History of IEEE.......................................................................................................................44
IEEE 802 Wireless Standards................................................................................................45
The 802.11 Working Group..............................................................................................45
The 802.15 Working Group..............................................................................................45
The 802.16 Working Group..............................................................................................46
The 802.11 Family of Standards............................................................................................46
The 802.11 Standard Details...........................................................................................46
802.11 Security................................................................................................................48
Operating Modes..............................................................................................................49
Roaming...........................................................................................................................50
The 802.11 Extensions..........................................................................................................50
802.11b............................................................................................................................50
802.11 a...........................................................................................................................52
802.11g............................................................................................................................53
802.11 Shortcomings.............................................................................................................54
Wireless Standards Comparison...........................................................................................55
Summary................................................................................................................................55
Chapter 4: Is Wireless LAN Right for You?...................................................................................56
Benefits of Wireless LANs.....................................................................................................56
Deployment Scenarios...........................................................................................................57
Small Office Home Office (SoHo)....................................................................................57
Enterprise.........................................................................................................................58
Wireless Internet Service Providers (WISPs...................................................................59
Costs Associated with Wireless LANs...................................................................................61
SoHo................................................................................................................................61
Enterprise.........................................................................................................................61
WISPs..............................................................................................................................61
Deployment Issues................................................................................................................61
SoHo................................................................................................................................61
Enterprise.........................................................................................................................62
WISPs..............................................................................................................................62
Security..................................................................................................................................62
Health Concerns....................................................................................................................63
Summary................................................................................................................................63
Part II: Secure Wireless LANs........................................................................................................64
Chapter Lis............................................................................................................................64
Part Overview...................................................................................................................64
Chapter 5: Network Security...........................................................................................................65
Overview................................................................................................................................65
Network Operational Security................................................................................................65
Physical Security..............................................................................................................66
Common Network Attacks on Operational Security...............................................................71
ii
Table of Contents
Chapter 5: Network Security
External Network Attacks.................................................................................................71
Internal Network Attacks..................................................................................................76
Network Data Security...........................................................................................................77
Resident−Data or File Security........................................................................................78
Protecting Data Using Cryptographic Primitives..............................................................78
Network Data Transmission and Link Security......................................................................79
Securing Network Transmission......................................................................................80
Summary................................................................................................................................86
Chapter 6: Securing the IEEE 802.11 Wireless LANs...................................................................87
Wireless LAN Security Requirements....................................................................................87
Wireless LAN Operational Security Requirements..........................................................88
Wireless LAN Data Security.............................................................................................90
The Institute of Electrical and Electronics Engineers (IEEE) 802.11 Standard Security........90
Service Set Identifiers (SSID)..........................................................................................91
Wired Equivalent Privacy (WEP) Protocol.......................................................................91
IEEE 802.11 WEP Protocol Weaknesses and Shortcomings................................................95
The Future of 802.11 Standard Security................................................................................96
Common Security Oversights................................................................................................96
Using Default or Out−of−the−Box Security......................................................................96
Using Fixed Shared Keys.................................................................................................97
Using Far−Too−Strong Radio Signals.............................................................................97
Extending Wireless LAN Security..........................................................................................97
The 802.1X Authentication Protoco.................................................................................97
Virtual Private Networks (VPNs)......................................................................................99
Securing Wireless LAN........................................................................................................100
User Authentication........................................................................................................101
Data Confidentiality and Privacy....................................................................................101
Wireless LAN Passwords and Usage Policies...............................................................102
Frequent Network Traffic and Usage Analysis...............................................................102
Summary..............................................................................................................................102
Part III: Building Secure Wireless LANs......................................................................................103
Chapter Lis..........................................................................................................................103
Part Overview.................................................................................................................103
Chapter 7: Planning Wireless LANs.............................................................................................104
Overview..............................................................................................................................104
Step 1: Understanding Your Wireless LAN Needs..............................................................104
Step 2: Planning the Scope of Rollout.................................................................................106
Step 3: Performing Site Survey............................................................................................106
Considering the Geographic Coverage Area.................................................................107
Per−Site Security Requirements....................................................................................107
Profiling Wireless LAN Users and Devices....................................................................107
Step 4: Setting Up Requirements and Expectations............................................................108
Network Bandwidth and Speed......................................................................................108
Coverage Area and Range of Wireless LANs................................................................108
Security..........................................................................................................................109
Step 5: Estimating the Required Wireless LAN Hardware and Software.............................109
iii
Table of Contents
Chapter 7: Planning Wireless LANs
Basic Wireless LAN Hardware.......................................................................................109
Software.........................................................................................................................111
Conventional Hardware Requirements for Various Deployment Scenarios...................112
Step 6: Evaluating the Feasibility of Wireless LANs and the Return on Investment
(ROI)...................................................................................................................................113
Step 7: Communicating the Final Plan with Higher Executives and Potential Users...........114
An Example of Wireless LAN Planning: Bonanza Corporation............................................114
Step 1: Bonanza Wireless LAN Needs..........................................................................114
Step 2: Planning the Rollou...........................................................................................115
Step 3: Site Survey........................................................................................................115
Step 4: Setting Up Requirements and Expectations......................................................116
Step 5: Estimating the Required LAN Hardware and Software......................................117
Step 6: Evaluating the Feasibility of Wireless LANs and Estimating Return on
Investment (ROI).....................................................................................................117
Step 7: Communicating the Wireless LAN Deployment Plan with Executives...............118
Summary..............................................................................................................................118
Chapter 8: Shopping for the Right Equipment...........................................................................119
Overview..............................................................................................................................119
Making Your Wireless LAN Equipment Shopping List.........................................................119
Explore the LAN Technologies Available in the Market.......................................................120
Wireless LAN Technologies...........................................................................................120
Wired LAN Ethernet Equipment Technologies...............................................................120
Virtual Private Network (VPN) Gateways and Clients....................................................121
Remote Authentication Dial−in User Service (RADIUS) Server....................................121
Wireless LAN Supporting Operating Systems...............................................................121
Major 802.11 Equipment Vendors and Their Products........................................................122
Cisco Systems...............................................................................................................122
Agere Systems/ORiNOCO.............................................................................................124
Linksys...........................................................................................................................126
NetGea..........................................................................................................................127
Xircom/Intel Corporation................................................................................................129
Decide Your Shopping Parameters.....................................................................................132
Shopping for LAN Equipment..............................................................................................132
Shopping on the Interne................................................................................................132
Shopping Using Mail−Order Catalogs............................................................................134
Shopping at a Local Computer Hardware or Office Supply Store..................................134
Shopping Tips......................................................................................................................134
Summary..............................................................................................................................135
Chapter 9: Equipment Provisioning and LAN Setup..................................................................136
Before We Start...................................................................................................................136
Identifying the Wireless LAN Components..........................................................................136
Wireless LAN Adapters..................................................................................................137
Wireless LAN Access Points (APs)................................................................................138
Wireless LAN Antennas.................................................................................................139
Networking Support Servers..........................................................................................139
Setting Up a Wireless LAN for the 802.11 Infrastructure Mode...........................................139
Setting Up a Wireless LAN Access Poin.......................................................................140
iv
Plik z chomika:
mikroprocesory
Inne pliki z tego folderu:
Źródła finansowania małych i średnich przedsiębiorstw w Polsce.pdf
(2661 KB)
Żeglarstwo morskie osób niewidomych na przykładzie projektu Zobaczyć Morze.pdf
(865 KB)
101_zabezpiecze__przed_atakami_w_sieci_komputerowej.pdf
(132961 KB)
101_Zabezpieczen_przed_atakami_w_sieci_komputerowej_-_M.Szmit.pdf
(68249 KB)
Analiza porównawcza modeli licencjonowania oprogramowania.pdf
(585 KB)
Inne foldery tego chomika:
bezpieczeństwo
dokumenty
egzamin
filmy
grafika
Zgłoś jeśli
naruszono regulamin