0%

Book Description

Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user.

Topics covered include--

  • Why conventional wireless LANs are so insecure--and what you can do about it

  • "Wardriving" software, equipment, and techniques: knowing your enemy

  • 802.11i, WPA, TKIP, and AES: the new wireless security options

  • 802.1x and EAP: enabling port-based authentication on your WLAN

  • Safely connecting WLANs to wired networks

  • Securing home and small office environments, one step at a time

  • Accessing VPNs from wireless devices

  • Integrating firewalls and wireless access points

  • Improving security in public access environments

  • Securing enterprise environments with 802.1x--a start-to-finish walkthrough

Table of Contents

  1. Copyright
  2. Acknowledgments
  3. Foreword
  4. Introduction
  5. The Need for Wireless LAN Security
    1. Introduction
    2. Security in Layers
    3. Size Matters—What Are You Protecting?
    4. Wireless LAN 101
    5. Shared Key Authentication
    6. Wi-Fi Protected Access (WPA)
    7. Beware: The Walls are Listening…
    8. Stop the RF Bleeding
    9. Summary
  6. Introduction to WLAN
    1. Introduction
    2. Pre-802.11
    3. 802.11 (1997)
    4. Spread Spectrum
    5. 801.11b
    6. Interoperability
    7. Critical Mass
    8. 802.11a
    9. 802.11g
    10. Other Working Groups
    11. 802.11 Specification
    12. A Tale of Two Topologies
    13. CSMA/CA
    14. RTS/CTS
    15. Fragmentation
    16. Summary
  7. WEP Vulnerabilities—Wired Equivalent Privacy?
    1. Introduction
    2. WEP 101
    3. Decrypting the WEP Message
    4. Key Management Problems
    5. RC4 Stream Cipher
    6. IV Collisions
    7. Message Injection
    8. Authentication Spoofing
    9. Brute Force Attacks
    10. Cracking WEP Keys
    11. Now What?
    12. Summary
  8. War Driving: Tools and Techniques
    1. Introduction
    2. What Is War Driving?
    3. Wireless Sniffers
    4. Putting It All Together
    5. Ethical Considerations
    6. War Chalking
    7. Summary
  9. 802.11i, WPA, TKIP, and AES
    1. Introduction
    2. WPA to the Rescue!
    3. TKIP
    4. WPA for the Home
    5. 802.11i and AES
    6. Summary
  10. 802.1x Explained
    1. Introduction
    2. Where Did 802.1x Come From?
    3. Guilty Until Proven Innocent (or Authenticated)
    4. 802.1x Authentication Conversation
    5. Solving Security Problems with 802.1x
    6. But Wait, There's More!
    7. Competing Standards
    8. Summary
  11. Connecting a WLAN to the Wired Network
    1. Introduction
    2. Assessing the Information Assets
    3. A Layered Approach
    4. Multiple SSIDs
    5. 802.1x vs. VPN
    6. Hands-on Projects
    7. Summary
  12. How to Deploy a VPN for Wireless Environments
    1. Introduction
    2. PPTP vs. L2TP/IPSec
    3. PPTP: Point-to-Point Tunneling Protocol
    4. L2TP: Layer 2 Tunneling Protocol with IPSec
    5. Choosing an Authentication Protocol
    6. Building a VPN Server
    7. Configuring the VPN Server
    8. Configuring Clients
    9. The Downside to VPNs
    10. Summary
  13. How to Secure and Manage a Home Environment
    1. Introduction
    2. Basic Security Steps
    3. Beyond Security: Managing the Network
    4. AP on Steroids?
    5. Linux Embedded Appliance Firewall (LEAF)
    6. Adding Wireless Client Support to Bering
    7. Sputnik Around the World
    8. ReefEdge Dolphin
    9. Summary
  14. How to Secure an Enterprise Environment
    1. Introduction
    2. 802.1x Revisited
    3. Setting Up the Authentication Server
    4. Configuring the CA
    5. Configuring the Authenticator
    6. Using EAP-TLS with Windows 2000 Server
    7. Summary
  15. Setting up a Secure Public Hotspot: Building a Linux-Based Access Point
    1. Introduction
    2. HostAP Prism Driver for Linux
    3. NoCat
    4. The 800-Pound Pebble
    5. LEAF to the Rescue
    6. Troubleshooting Tips
    7. Summary
  16. Introduction to RF
    1. The History of Radio Frequency
    2. Electromagnetism
    3. Induction
    4. Conduction
    5. Radio Waves
    6. Structure of a Wave
    7. Modulation
    8. Attenuation
    9. Antennae
    10. How Antennae Work
    11. Different Kinds of Antennae
    12. Antenna Types
    13. Summary
  17. 802.11 Frame Types
    1. Management Frames
    2. Control Frames
    3. Data Frames
  18. Community Wireless Networking
    1. For Pay
    2. Amenity
    3. Utility
    4. User Groups
    5. The Mission
    6. The Legal Issues
    7. Sentre Partners in San Diego
    8. Software Options for Free Hotspots
    9. The Big Picture
  19. Building a Pringles® Can Antenna
    1. Shopping List
    2. Tools You'll Need
    3. Building the Antenna
18.221.154.151