Security of a wireless network still ranks as one of the largest concerns of IT professionals planning to roll out an enterprise wireless LAN. Many people erroneously believe that a wireless LAN is inherently insecure. This is largely due to security flaws in early Wi-Fi protocols like WEP (Wired Equivalency Protocol), more recent vulnerabilities found in TKIP and lack of awareness as to how to deploy a secure WLAN. Today the security concerns of the legacy protocols have been largely eliminated and best practices for secure deployment have been developed allowing many wireless deployments to be arguably more secure than their wired counterparts.
When people first think of wireless security they typically first think of things like WEP, WPA and rogue detection. While these things are an important part of wireless security, they are only a part of building a secure wireless network.
Wireless security just like wired security has gone through evolutionary improvement over the years. As security evolved, more capabilities were added to improve the security of the network and deal with new threats. Today security is more than just a single feature and instead is a solution and set of practices defined to provide security for a specific network configuration. This whitepaper will help the wireless network administrator or security manager to understand the security capabilities in a modern Wi-Fi solution, where they should be used and how the WLAN integrates with other security devices in the network. Finally this document will describe how Aerohive provides a comprehensive and market leading Wi-Fi security solution for the enterprise.
Download Paper
(Webtorials registration required. Click here if you forgot your username/password.)
This is a great complement to the current discussion on WIPS.
In particular, it gives a broad view of a wide range of wireless security issues, including Wireless Privacy, Authentication, Client Management and NAC, Identity Based Access Control, Network Firewall and Intrusion Detection and Protection, ogue Detection and WIDS, Security Reporting and Security Event Management (SEM), Device Physical Security and Data Storage, and Compliance.
I highly recommend your adding this to your personal library.