Professional Documents
Culture Documents
ï ses
ï Benefits
ï Standards
ï Functionality
ï Security Issues
ï Solutions and Implementations
ï Increased productivity
± Improved collaboration
± No need to reconnect to the network
± Ability to work in more areas
ï Reduced costs
± No need to wire hard-to-reach areas
ï IEEE 802.11
ï IEEE 802.11b
ï IEEE 802.11a
ï IEEE 802.11e
ï HiperLAN/2
ï Interoperability
Ñ
ï Basic Configuration
ï WLAN Communication
ï WLAN ÿacket Structure
!
Ñ
a
Î ½
Application
ÿresentation
Session
Transport
Network
Data Link 802.11 MAC header
802.11b
ÿhysical 802.11 ÿLCÿ header
G
[
Ñ
[
G
[
Ñ
[
½
ï Access is binary
ï Full network access or no network access
ï Need means of identifying and enforcing
access policies
ÿlaintext
Traffic Encrypted Traffic
ï 11-100 users
ï Can use MAC addresses, WEÿ and rotate
keys if you want.
ï Some vendors have limited MAC storage
ability
ï SLAN also an option
ï Another solution is to tunnel traffic through a
VÿN
½ |
6
ï 100+ users
ï Reconfiguring WEÿ keys not feasible
ï Multiple access points and subnets
ï ÿossible solutions include VLANs, VÿNs,
custom solutions, and 802.1x
6
ï Mandy@arcsec.com
ï ÿresentation available for download at
www.arcsec.com and
www.survivingsecurity.com