- "Do I Know This Already?" Quiz
- Foundation Topics
- Foundation Summary
- Q&A
Foundation Summary
The Foundation Summary is a collection of information that provides a convenient review of many key concepts in this chapter. If you are already comfortable with the topics in this chapter, this summary can help you recall a few details. If you just read this chapter, this review should help solidify some key facts. If you are doing your final preparation before the exam, this information will be a convenient way to review the day before the exam.
Table 18-3. Comparison of Wireless LAN Security Methods
Method |
Credentials Used |
Data Security |
Open Authentication |
None |
None |
Pre-Shared Key (static WEP) |
Static WEP key |
WEP encryption (static key) |
LEAP |
Username/password |
WEP encryption (dynamic keys) |
EAP-TLS |
Digital certificate |
WEP encryption (dynamic keys) |
PEAP |
Server: Digital certificate Client: Any EAP method |
WEP encryption (dynamic keys) |
EAP-FAST |
PAC to build tunnel; Username/password |
WEP encryption (dynamic keys) |
WPA |
Any EAP-based method or pre-shared key |
WEP encryption, per-packet keys generated by TKIP MIC performs packet authentication for integrity |
WPA2 |
Any EAP-based method Pre-shared key Proactive key caching (authenticate once while roaming across APs) |
AES encryption or TKIP MIC performs packet authentication for integrity |
In this table, the darker shading indicates increasing levels of security.
Table 18-4. Client Roaming Methods
Roaming Method |
Description |
Passive roaming |
Client scans other channels to listen for beacons from candidate APs |
Active roaming |
Client scans other channels and sends 802.11 probe requests to find candidate APs |
Table 18-5. Best Practice AP Cell Size Guidelines
AP Radio |
Typical Maximum Throughput Per Cell |
802.11b |
6.8 Mbps |
802.11g |
32 Mbps |
802.11a |
32 Mbps |