Skip to main content

Enhanced Security for Wireless Lans and Wans in the Enterprise: Hands on

  • Chapter
Guide to Wireless Network Security
  • 1488 Accesses

5. Summary and Conclusions

Wireless LANs are being rapidly adopted due to the convenience and flexibility they provide. However, WLANs create a new set of security threats to enterprise networks such as Rogue APs, Mis-configured APs, Soft APs, MAC Spoofing, Honeypot APs, DOS, and Ad hoc Networks.

Neither traditional firewalls and VPNs nor IEEE 802.11 security standards such as WEP, WPA, 802. lx, and 802.1 1i can protect enterprise networks against over-the-air attacks from WLANs. So, a new and comprehensive security solution in the form of a WiFi Firewall is required to alleviate these new security threats. The WiFi Firewall must be able to provide RF planning, detection of RF activity, accurate classification of WLAN networks, automatic and reliable prevention from harmful WLAN transmissions, and precision location tracking of WLAN devices.

Now, in many ways, Wireless Wide Area Networks solutions can be integrated into a general purpose remote access solution for the enterprise. Whether they are circuit-switched dialup solutions or packet-data Internet connections, wired and wireless remote access can look the same to the enterprise perimeter.

Finally, they can use the same protocols and remote access products. In fact there is a compelling case for creating unified and simplified approach to remote access. However, there is need to ensure that wireless networks have unique requirements and therefore a traditional and standard solution may not necessarily be optimal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

6. References

  1. “WLAN Security,” Executive [Snapshot], Copyright ⇒ 2005 Computerworld Inc. All rights reserved. Computerworld Inc. One Speen Street, Framingham, MA 01701, 2005.

    Google Scholar 

  2. Kathy Keenan, “What Hackers Don’t Want You to Know About Your WLAN,” Copyright © 2002–2005, AirMagnet, Inc. AirMagnet, Inc., 1325 Chesapeake Terrace, Sunnyvale, CA 94089, 2004.

    Google Scholar 

  3. Tom Kaneshige, “Wireless Security: Why Such A Bad Rap?,” SearchNetworking.com, TechTarget, 117 Kendrick Street, Needham, MA 02494, (©Copyright 2005, TechTarget. All rights reserved), July 28, 2005.

    Google Scholar 

  4. “Wireless LAN Security—Why Your Firewall, VPN, and IEEE 802.1 li Aren’t Enough To Protect Your Network,” Airtight Networks, Copyright © 2002–2005, Airtight Networks. All rights reserved. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043, February, 2005.

    Google Scholar 

  5. “Enterprise Wireless WAN Security,” © 2005 Hewlett-Packard Development Company, L.P., Hewlett-Packard Company, 3000 Hanover Street, Palo Alto, CA 94304-1185 USA, 2005.

    Google Scholar 

  6. John R. Vacca, Firewalls: Jumpstart for Network and Systems Administrators, Digital Press, 2004.

    Google Scholar 

  7. John R. Vacca, Net Privacy: A Guide to Developing and Implementing an Ironclad ebusiness Privacy Plan, McGraw-Hill, 2001.

    Google Scholar 

  8. John R. Vacca, Identity Theft, Prentice Hall, 2002.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

(2006). Enhanced Security for Wireless Lans and Wans in the Enterprise: Hands on. In: Guide to Wireless Network Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29845-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-29845-0_4

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-95425-7

  • Online ISBN: 978-0-387-29845-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics