5. Summary and Conclusions
Wireless LANs are being rapidly adopted due to the convenience and flexibility they provide. However, WLANs create a new set of security threats to enterprise networks such as Rogue APs, Mis-configured APs, Soft APs, MAC Spoofing, Honeypot APs, DOS, and Ad hoc Networks.
Neither traditional firewalls and VPNs nor IEEE 802.11 security standards such as WEP, WPA, 802. lx, and 802.1 1i can protect enterprise networks against over-the-air attacks from WLANs. So, a new and comprehensive security solution in the form of a WiFi Firewall is required to alleviate these new security threats. The WiFi Firewall must be able to provide RF planning, detection of RF activity, accurate classification of WLAN networks, automatic and reliable prevention from harmful WLAN transmissions, and precision location tracking of WLAN devices.
Now, in many ways, Wireless Wide Area Networks solutions can be integrated into a general purpose remote access solution for the enterprise. Whether they are circuit-switched dialup solutions or packet-data Internet connections, wired and wireless remote access can look the same to the enterprise perimeter.
Finally, they can use the same protocols and remote access products. In fact there is a compelling case for creating unified and simplified approach to remote access. However, there is need to ensure that wireless networks have unique requirements and therefore a traditional and standard solution may not necessarily be optimal.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
6. References
“WLAN Security,” Executive [Snapshot], Copyright ⇒ 2005 Computerworld Inc. All rights reserved. Computerworld Inc. One Speen Street, Framingham, MA 01701, 2005.
Kathy Keenan, “What Hackers Don’t Want You to Know About Your WLAN,” Copyright © 2002–2005, AirMagnet, Inc. AirMagnet, Inc., 1325 Chesapeake Terrace, Sunnyvale, CA 94089, 2004.
Tom Kaneshige, “Wireless Security: Why Such A Bad Rap?,” SearchNetworking.com, TechTarget, 117 Kendrick Street, Needham, MA 02494, (©Copyright 2005, TechTarget. All rights reserved), July 28, 2005.
“Wireless LAN Security—Why Your Firewall, VPN, and IEEE 802.1 li Aren’t Enough To Protect Your Network,” Airtight Networks, Copyright © 2002–2005, Airtight Networks. All rights reserved. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043, February, 2005.
“Enterprise Wireless WAN Security,” © 2005 Hewlett-Packard Development Company, L.P., Hewlett-Packard Company, 3000 Hanover Street, Palo Alto, CA 94304-1185 USA, 2005.
John R. Vacca, Firewalls: Jumpstart for Network and Systems Administrators, Digital Press, 2004.
John R. Vacca, Net Privacy: A Guide to Developing and Implementing an Ironclad ebusiness Privacy Plan, McGraw-Hill, 2001.
John R. Vacca, Identity Theft, Prentice Hall, 2002.
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2006). Enhanced Security for Wireless Lans and Wans in the Enterprise: Hands on. In: Guide to Wireless Network Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29845-0_4
Download citation
DOI: https://doi.org/10.1007/978-0-387-29845-0_4
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-95425-7
Online ISBN: 978-0-387-29845-0
eBook Packages: Computer ScienceComputer Science (R0)