Premium Content

Access "Checklist for secure wireless LAN deployment"

Published: 01 Apr 2003

Policy Define business requirements (assets and wireless access needs). Identify threats and quantify risks. Document your WLAN security policy. Disseminate policy to everyone. Integration planning Conduct site survey, creating inventories and maps. Lay out access points (APs) and antennas to minimize signal leakage. Determine AP placement relative to existing firewalls. Pick approach to protect adjacent wired network. Define network topology and impact on routers, VLANs. Identify reuse of access control lists (ACLs), DHCP, user databases, desktop security software. Identify software and procedures to harden APs and stations. Identify interfaces for integrated WLAN management and monitoring. Determine need for WLAN-specific policy management tools. Policy implementation Pick access control method(s): MAC ACLs, 802.1X, SSL portal. Define access policies for authorized APs, stations, users, groups and guests. Issue and distribute authentication credentials to every station. Select encryption layer(s): 802.11, network, transport, application. Pick ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free