April 2006

  • Recipe for rogue hunting

    Detecting rogues is fairly easy, but eliminating them can be surprisingly tough. This tip describes a methodical rogue hunting process and tools that can help.

  • Using your WIDS to monitor WLAN performance

    "Wireless intrusion detection" -- the very name brings to mind security. But many WIDS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-t...

  • Fighting wireless DoS attacks

    Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occ...

  • The ins and outs of AP placement

    Many installers make the mistake of treating 802.11 WLANs just like Ethernet, placing access points (APs) in locations that facilitate outsider access to corporate networks. But, from a security pe...

  • Wireless Security Lunchtime Learning Final Exam

    You've finished Wireless Security Lunchtime Learning, now take this 10-question multiple-choice exam to see how much you've retained.

  • Auditor's office wards off potential wireless threats

    Because of its strict anti-wireless policy, the Washington State Auditor's Office needed a way to ensure that no one inside or outside could tap into the state network wirelessly.

  • Wireless network security lunchtime learning

    Whether your company has grown its WLAN organically, officially deployed a WLAN or implemented a strict policy against WLANs, Wi-Fi poses risks to your network. Our Wireless Security Lunchtime Lear...

  • Wireless Security Lunchtime Learning Entrance Exam

    Assess your knowledge of wireless LAN security with this 10-question multiple choice entrance exam.

  • Lesson 3: How to implement secure access

    In Lesson 3 of Wireless Security Lunchtime Learning, you'll learn the pros and cons of the various wireless access protocols so you can choose the best method to control, authenticate and authorize...

  • Lesson 1 quiz: Risky business

    Test your retention of the material taught in Lesson 1 of Wireless Security Lunchtime Learning.

  • Lesson 2: How to build a secure wireless infrastructure

    In Lesson 2 of Wireless Security Lunchtime Learning, you'll learn how to build a secure wireless infrastructure by understanding the myriad security standards and features that Wi-Fi products boast...

  • Lesson 4 quiz: I'll be watching you

    Find out how much you learned in Lesson 4 of Wireless Security Lunchtime Learning.

  • Lesson 2 quiz: From the ground up

    Find out how much you learned in Lesson 2 of Wireless Security Lunchtime Learning.

  • Wi-Fi vulnerability assessment checklist

    Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This c...

  • Getting from here to there: WPA2 migration

    WEP has been cracked, WPA is a band-aid, and your CSO recommends upgrading to WPA2. Great, but that's just not going to happen overnight. How do you migrate your installed base of legacy equipment?...

  • Controlling WLAN access on a tight budget

    WPA and WPA2-Enterprise provide robust WLAN access control, but deploying 802.1X can be overwhelming for companies with limited IT staff and budget. From outsource to open source to preshared keys,...

  • Using VLANs to compartmentalize WLAN traffic

    Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilitie...

  • Wireless attacks, A to Z

    In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference l...

  • Combining 802.1X and VLANs for WLAN authorization

    Many WLAN owners know that 802.1X/EAP makes it possible to authenticate individual wireless users. But did you know that 802.1X can also be used to funnel wireless traffic onto VLANs, enforcing use...

  • Choosing the right flavor of 802.1X

    Which of the nearly 50 defined EAP Types would work best in your WLAN? In this tip, we compare the most popular EAP Types used with 802.1X, authentication methods that can be supported by each, kno...