Cover image for Building secure wireless networks with 802.11
Title:
Building secure wireless networks with 802.11
Personal Author:
Publication Information:
Chichester, UK : John Wiley & Sons Inc., 2003
ISBN:
9780471237150
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010023779 TK5105.78 K52 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

Provides a step-by-step approach for planning and implementing a wireless LAN based on 802.11 Wireless Fidelity (Wi-Fi) technology Authors are Wi-Fi security experts who are able to address the firestorm of concerns about security for 802.11b networks Offers a clear perspective of interoperability with related wireless standards like 802.11a, HomeRF, and Bluetooth Explains how to achieve the same performance as a wired Ethernet connection and deliver flexibility and high speed


Author Notes

Jahanzeb Khan is Principal Engineer with RSA Security, Inc.
Anis Khwaja works in the IT department of a leading financial services firm


Table of Contents

Acknowledgmentsp. xiii
About the Authorsp. xv
Introductionp. xvii
Part 1 Introduction to Wireless Local Area Networks (LANs)p. 1
Chapter 1 Networking Basicsp. 3
Development of Computer Networks: An Overviewp. 4
Network Typesp. 8
Peer-to-Peer Networksp. 8
Local Area Networks (LANs)p. 9
Wide Area Networks (WANs)p. 9
Personal Area Networks (PANs)p. 11
The Internetp. 11
Virtual Private Networks (VPNs)p. 12
Network Topologiesp. 13
Three Commonly Used Topologiesp. 13
Choosing the Right Topologyp. 15
Network Hardware and Softwarep. 17
Networking Componentsp. 17
Networking Softwarep. 28
Networking Protocol: TCP/IPp. 28
Putting It All Togetherp. 32
Summaryp. 33
Chapter 2 Wireless LANsp. 35
Evolution of Wireless LANs: An Overviewp. 36
A Basic Wireless LANp. 37
Basic Architecture of a Wireless LANp. 39
Wireless LAN Adaptersp. 40
Access Points (APs)p. 47
Wireless LAN Configurationsp. 49
Ad-Hoc Modep. 49
Infrastructure Modep. 49
Distribution Service Systems (DSSs)p. 50
Existing Wireless LAN Standardsp. 51
IEEE 802.11p. 52
IEEE 802.11bp. 52
IEEE 802.11ap. 52
HomeRFp. 52
Bluetoothp. 53
Are Wireless LANs Risks to Health?p. 53
Security Risksp. 53
Summaryp. 54
Chapter 3 The Institute of Electrical and Electronics Engineers (IEEE) 802.11 Standardsp. 55
History of IEEEp. 56
IEEE 802 Wireless Standardsp. 56
The 802.11 Working Groupp. 57
The 802.15 Working Groupp. 57
The 802.16 Working Groupp. 58
The 802.11 Family of Standardsp. 58
The 802.11 Standard Detailsp. 59
802.11 Securityp. 61
Operating Modesp. 62
Roamingp. 63
The 802.11 Extensionsp. 64
802.11bp. 64
802.11ap. 66
802.11gp. 68
802.11 Shortcomingsp. 69
Wireless Standards Comparisonp. 69
Summaryp. 70
Chapter 4 Is Wireless LAN Right for You?p. 71
Benefits of Wireless LANsp. 72
Deployment Scenariosp. 73
Small Office Home Office (SoHo)p. 73
Enterprisep. 74
Wireless Internet Service Providers (WISPs)p. 75
Costs Associated with Wireless LANsp. 78
SoHop. 79
Enterprisep. 79
WISPsp. 79
Deployment Issuesp. 79
SoHop. 80
Enterprisep. 80
WISPsp. 80
Securityp. 81
Health Concernsp. 81
Summaryp. 81
Part 2 Secure Wireless LANsp. 83
Chapter 5 Network Securityp. 85
Network Operational Securityp. 86
Physical Securityp. 87
Common Network Attacks on Operational Securityp. 94
External Network Attacksp. 94
Internal Network Attacksp. 101
Network Data Securityp. 103
Resident-Data or File Securityp. 104
Protecting Data Using Cryptographic Primitivesp. 104
Network Data Transmission and Link Securityp. 106
Securing Network Transmissionp. 108
Summaryp. 116
Chapter 6 Securing the IEEE 802.11 Wireless LANsp. 117
Wireless LAN Security Requirementsp. 118
Wireless LAN Operational Security Requirementsp. 119
Wireless LAN Data Securityp. 122
The Institute of Electrical and Electronics Engineers (IEEE) 802.11 Standard Securityp. 123
Service Set Identifiers (SSID)p. 123
Wired Equivalent Privacy (WEP) Protocolp. 123
IEEE 802.11 WEP Protocol Weaknesses and Shortcomingsp. 129
The Future of 802.11 Standard Securityp. 131
Common Security Oversightsp. 131
Using Default or Out-of-the-Box Securityp. 131
Using Fixed Shared Keysp. 132
Using Far-Too-Strong Radio Signalsp. 132
Extending Wireless LAN Securityp. 132
The 802.1X Authentication Protocolp. 132
Virtual Private Networks (VPNs)p. 136
Securing Wireless LANp. 137
User Authenticationp. 138
Data Confidentiality and Privacyp. 138
Wireless LAN Passwords and Usage Policiesp. 139
Frequent Network Traffic and Usage Analysisp. 139
Summaryp. 139
Part 3 Building Secure Wireless LANsp. 141
Chapter 7 Planning Wireless LANsp. 143
Step 1 Understanding Your Wireless LAN Needsp. 144
Step 2 Planning the Scope of Rolloutp. 147
Step 3 Performing Site Surveyp. 147
Considering the Geographic Coverage Areap. 147
Per-Site Security Requirementsp. 148
Profiling Wireless LAN Users and Devicesp. 148
Step 4 Setting Up Requirements and Expectationsp. 149
Network Bandwidth and Speedp. 150
Coverage Area and Range of Wireless LANsp. 150
Securityp. 150
Step 5 Estimating the Required Wireless LAN Hardware and Softwarep. 150
Basic Wireless LAN Hardwarep. 151
Softwarep. 154
Conventional Hardware Requirements for Various Deployment Scenariosp. 155
Step 6 Evaluating the Feasibility of Wireless LANs and the Return on Investment (ROI)p. 157
Step 7 Communicating the Final Plan with Higher Executives and Potential Usersp. 158
An Example of Wireless LAN Planning: Bonanza Corporationp. 158
Step 1 Bonanza Wireless LAN Needsp. 159
Step 2 Planning the Rolloutp. 160
Step 3 Site Surveyp. 161
Step 4 Setting Up Requirements and Expectationsp. 162
Step 5 Estimating the Required LAN Hardware and Softwarep. 163
Step 6 Evaluating the Feasibility of Wireless LANs and Estimating Return on Investment (ROI)p. 164
Step 7 Communicating the Wireless LAN Deployment Plan with Executivesp. 165
Summaryp. 165
Chapter 8 Shopping for the Right Equipmentp. 167
Making Your Wireless LAN Equipment Shopping Listp. 168
Explore the LAN TechnologiesAvailable in the Marketp. 169
Wireless LAN Technologiesp. 169
Wired LAN Ethernet Equipment Technologiesp. 169
Virtual Private Network (VPN) Gateways and Clientsp. 170
Remote Authentication Dial-in User Service (RADIUS) Serverp. 170
Wireless LAN Supporting Operating Systemsp. 171
Major 802.11 Equipment Vendors and their Productsp. 172
Cisco Systemsp. 172
Agere Systems/ORiNOCOp. 174
Linksysp. 176
NetGearp. 178
Xircom/Intel Corporationp. 180
Decide Your Shopping Parametersp. 183
Shopping for LAN Equipmentp. 184
Shopping on the Internetp. 184
Shopping Using Mail-Order Catalogsp. 185
Shopping at a Local Computer Hardware or Office Supply Storep. 186
Shopping Tipsp. 186
Summaryp. 187
Chapter 9 Equipment Provisioning and LAN Setupp. 189
Before We Startp. 190
Identifying the Wireless LAN Componentsp. 190
Wireless LAN Adaptersp. 191
Wireless LAN Access Points (APs)p. 193
Wireless LAN Antennasp. 193
Networking Support Serversp. 194
Setting Up a Wireless LAN for the 802.11 Infrastructure Modep. 195
Setting Up a Wireless LAN Access Pointp. 195
Setting Up Wireless LAN Adaptersp. 202
Finishing the Access Point Configurationp. 210
Testing Your Standalone Wireless LANp. 215
Adding More Computers to Your Standalone Wireless LANp. 216
Connecting a Wireless LAN to the Internetp. 216
Using Multiple AP Configurationsp. 218
Overlapping AP Configurationp. 218
Non-Overlapping AP Configurationp. 220
Setting Up Wireless LAN for the 802.11 Ad-Hoc Modep. 222
Summaryp. 223
Chapter 10 Advanced 802.11 Wireless LANsp. 225
High Security and Authentication--Enabled 802.11 Wireless LANsp. 225
The 802.1X Standardp. 226
Virtual Private Network for Wireless LANsp. 227
Building a Secure Wireless LAN with 802.1X and VPN Technologyp. 231
Point-to-Point Wireless Connectivity between Two Sitesp. 244
Point-to-Point Wireless Connectivity Requirementsp. 245
Network Configurationp. 245
Setting Up ORiNOCO Point-to-Point Radio Backbone Kitp. 246
Securing the Point-to-Point Wireless Connectivity Using VPNp. 249
Secure Remote Access from a Wireless LAN over the Internet Using VPNsp. 249
Summaryp. 250
Part 4 Troubleshooting and Keeping Your Wireless LAN Securep. 251
Chapter 11 Troubleshooting Wireless LANsp. 253
Common Problemsp. 253
Hardware Problemsp. 254
Software Problemsp. 256
Handling Bandwidth Congestion Due to Competing Devicesp. 258
Upgrading Wireless LANsp. 259
Optimizing and Managing the Network Load through Monitoring Wireless LAN Qualityp. 260
Summaryp. 260
Chapter 12 Keeping Your Wireless LAN Securep. 261
Establishing Security Policyp. 262
Understanding Your Security Policy Requirementsp. 262
Creating Security Policyp. 265
Communicating Security Policyp. 271
Security Policy Compliancep. 271
Intrusion Detection and Containmentp. 272
Wireless LAN AP Monitoring Softwarep. 272
Intrusion Detection Softwarep. 272
Antivirus Softwarep. 272
Firewall and Router Logsp. 273
Network Login and Activity Logsp. 273
Getting Ready for Future Security Challengesp. 273
Summaryp. 273
Appendix A Wireless LAN Case Studiesp. 275
Home-Based Wireless LANs: The Khwaja Family Residencep. 276
Backgroundp. 276
The Problemp. 276
The Solutionp. 277
Resultsp. 278
Futurep. 278
A Small Corporation Wireless LAN: The Morristown Financial Groupp. 278
Backgroundp. 278
The Problemp. 279
The Solutionp. 279
The Resultsp. 279
The Futurep. 280
Campus-Wide Wireless LAN: Carnegie Mellon Universityp. 280
Backgroundp. 280
The Problemp. 281
The Solutionp. 281
The Resultsp. 283
Wireless Internet Service Providers: M-33 Accessp. 283
Backgroundp. 283
The Problemp. 283
The Solutionp. 284
The Resultp. 286
The Futurep. 286
Appendix B Installing ORiNOCO PC Card Under Various Operating Systemsp. 287
Installing under Windows 98, Windows ME, and Windows 2000p. 287
System Requirementsp. 288
Software Requirementsp. 288
Installation Stepsp. 288
Installing under Windows NT 4.0p. 294
System Requirementsp. 294
Software Requirementsp. 294
Installation Stepsp. 295
Installing under Mac OSp. 296
System Requirementsp. 297
Software Requirementsp. 297
Installation Stepsp. 297
Installing under Linuxp. 300
System Requirementsp. 300
Software Requirementsp. 300
Installation Stepsp. 300
Glossary of Terms and Abbreviationsp. 305
Referencesp. 321
Indexp. 323