Access "Checklist for secure wireless LAN deployment"
This article is part of the April 2003 issue of Unwrapping Windows Server 2003: An exclusive first look at Microsoft's new OS
Policy Define business requirements (assets and wireless access needs). Identify threats and quantify risks. Document your WLAN security policy. Disseminate policy to everyone. Integration planning Conduct site survey, creating inventories and maps. Lay out access points (APs) and antennas to minimize signal leakage. Determine AP placement relative to existing firewalls. Pick approach to protect adjacent wired network. Define network topology and impact on routers, VLANs. Identify reuse of access control lists (ACLs), DHCP, user databases, desktop security software. Identify software and procedures to harden APs and stations. Identify interfaces for integrated WLAN management and monitoring. Determine need for WLAN-specific policy management tools. Policy implementation Pick access control method(s): MAC ACLs, 802.1X, SSL portal. Define access policies for authorized APs, stations, users, groups and guests. Issue and distribute authentication credentials to every station. Select encryption layer(s): 802.11, network, transport, application. Pick ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Examining Windows Server 2003 operating system security
by Randal Franklin Smith
Microsoft promised Windows Server 2003 would be "secure by design, secure by default and secure in deployment." We took the wrapper off this new OS to see if it lives up to expectations.
-
Best practices for Windows 2003 migration
by Lawrence Walsh
Case study: Enterasys Networks shares the good and the bad on its Windows Server 2003 migration.
-
Exposing and addressing wireless security concerns
by Anne Saita
Campus IT managers' emphasis on wireless security puts them at the head of the class.
-
Keeping WLANs safe with WLAN security tools
by Lisa Phifer, Contributor
Check out a variety of seurity managers tools to help keep WLANs safe.
-
Computer threats gaining momentum in 2002, survey says
by Larry Bridwell and Lawrence Walsh
There were no global "virus disasters" in 2002. But the malware problem still got worse, according to the 8th annual ICSA Labs Virus Prevalence Survey.
-
VoIP security: Real-world VoIP implementation best practices
by Anne Saita
If you want VoIP security, the pros say do your homework and roll up your sleeves during VoIP implementations.
-
Examining Windows Server 2003 operating system security
by Randal Franklin Smith
-
-
Windows 2003: IIS Web server security best practices
by Randal Franklin Smith, Contributor
Sidebar: Microsoft makes good on its promise to make Windows 2003 and IIS secure by default.
-
WLAN security: Best practices for wireless network security
by Lisa Phifer, Contributor
WEP and war drivers scaring you away? Try these new solutions and best practices to protect your wireless networks.
-
Checklist for secure wireless LAN deployment
by Lisa Phifer, Contributor
Lisa Phifer outlines a checklist for secure wireless LAN deployment in the areas of policy, integration planning, and deployment and beyond.
-
Merging firewalls: Making your enterprise more secure with Sidewinder
by Fred Avolio, Contributor
Review: Secure Computing creates an impressive product by merging two leading firewalls into the Sidewinder G2.
-
VoIP network security protocols: Is VoIP secure?
by Steven Taylor, Contributor
Is your network equal to the task? Are you willing to risk exposing data and voice on the Internet?
-
Windows 2003: IIS Web server security best practices
by Randal Franklin Smith, Contributor
-
Columns
-
Lessons of cyberwar: A chance to boost information security budgets
by Andrew Briney
In the wake of an incident, CISOs should make the most of the opportunity to increase information security budgets.
-
HIPAA 2003 deadline sparks rush toward compliance
by Anne Saita
With the HIPAA 2003 privacy rule deadline approaching, some health care organizations are speeding toward HIPAA compliance; others hope to avoid a bitter security pill.
-
Network packet analyzers enable enterprise 'packet peeking'
by Marcus J. Ranum, Contributor
Marcus Ranum explains how network packet analyzers offer a worm's-eye view of what's traversing an enterprise network.
-
Reality AV: Infosec storylines make for good reality TV ideas
by Lawrence Walsh
Is a Hacker Dating Game show that far-fetched? A few infosec storylines that would play well as reality TV ideas.
-
Lessons of cyberwar: A chance to boost information security budgets
by Andrew Briney
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO