• Home
  • Contact
  • Learn
  • Home
  • Contact
  • Learn
Quadrio Networks - Wi-Fi Professional Services in Vancouver
  • Home
  • Contact
  • Learn

IEEE 802.11 Network Security
. . . .


5.1. IEEE 802.11 Network Security Architecture

5.1.1. Identify and describe the strengths, weaknesses, appropriate uses, and implementation of the following IEEE 802.11 security-related items:
  • Weak Security Mechanisms
    • WEP cipher suite
    • Open System Authentication
    • Shared Key Authentication
    • MAC filtering
    • SSID hiding
  • Effective Security Mechanisms
    • WPA- / WPA2-Enterprise
    • WPA- / WPA2-Personal
    • TKIP and CCMP cipher suites
    • 802.1X / EAP framework
    • Preshared Key (PSK) / passphrase authentication
    • Per-user Preshared Keys (PPSK)
    • Wi-Fi Protected Setup (WPS)
  • Additional Mechanisms
    • Secure device management protocols (HTTPS, SNMPv3, SSH2)
    • Role Based Access Control (RBAC)
    • Captive portals and guest networks (BYOD)
    • Protected management frames
    • Fast Secure Roaming methods

5.2. IEEE 802.11 Network Security Analysis, Performance Analysis, and Troubleshooting

5.2.1. Describe, explain, and illustrate the appropriate applications for the following wireless security solutions from a monitoring, containment and reporting perspective:
  • Wireless Intrusion Protection System (WIPS)
  • Protocol and spectrum analyzers
© COPYRIGHT 2023. ALL RIGHTS RESERVED.