Summary
There is a lot of information in this chapter about WLAN security. We examined the potential vulnerabilities in an 802.11 WLAN. The risks discussed were as follows:
- Vulnerabilities inherent to the radio transmission medium
- Vulnerabilities inherent to the standards definitions
- Vulnerabilities inherent to mobility
- Readily available profiling and attack tools
- Misconfigured wireless devices and clients
- Rogue access points and devices
We then looked in detail at how the 802.11 WEP standard was broken and how the newer 802.11i, WPA, and WPAv2 standards solve the WEP problems and allow strong authentication and data privacy through 802.1X/EAP and TKIP and CCMP. We also looked at overlay options.
The chapter concluded with a look at other aspects of WLAN security, including rogue device detection and mitigation, wireless intrusion detection and protection, secure management practices, techniques for protecting WLAN client devices, and security configuration policy monitoring and enforcement, as well as how to deal with RF containment challenges.
This has been a lot of information for sure, but you should now know enough about WLAN security to understand what it takes to secure a WLAN deployment.