This Content Component encountered an error

Don't miss need-to-know info!

Security pros can't afford to be the last to know. Sign up for email updates from SearchSecurity.com and you'll never be behind the curve!
Providing secure wireless access to your base of employees requires careful considerations. A proper enterprise wireless network setup must have a solid base, for example, one that incorporates WI-FI standards like 802.11i and WPA. Services have to be readily available for your entire workforce, and network bandwidth needs to be sufficient for users' needs. Inbound and outbound security policies must be created to handle unauthenticated guest user access, and security teams have to invest in the appropriate technology, like WLAN switches, firewalls and intrusion detection systems.

In a four-part video series, Joel Snyder of Opus One goes beyond the basics of building a solid infrastructure and carefully walks you through the phases of a secure wireless network setup. Learn the policies, technologies, and standards that are absolutely essential in providing usability, availability and security to the enterprise network.

Use the summary briefs below to jump to full descriptions of each video.


VIDEOS FEATURED IN THIS SERIES  
PART 1: Wireless network security: 802.11i basics.

PART 2: How to manage guest user authentication when building a wireless network.

PART 3: How to increase the RF footprint and bandwidth of a wireless network.

PART 4: Must-haves for Wireless network security: WLAN switches, intrusion detection, and more.

About Joel Snyder.


PART 1: Wireless network security: 802.11i basics
A proper enterprise wireless network setup must always begin with a good base, one that uses standards like 802.11i and WPA. Users need to connect to access points securely.

In this video, Joel Snyder of Opus One reviews the protocols, along with the other minimum requirements necessary for building a secure network.

PART 2: How to manage guest user authentication when building a wireless network
Because wireless Internet access is now considered a common utility, handling guest user acess deserves careful consideration. Depending on your organization, there are various options -- some more conservative than others -- for outbound and inbound policies.

Joel Snyder reviews your different choices and how to deal with the threat of unauthenticated users.

PART 3: How to increase the RF footprint and bandwidth of a wireless network
An acceptable business class wireless network requires aggressive management of an organization's radio frequency (RF) footprint and bandwidth. The employees in your office -- wherever they're located in the building -- will need to have network services readily available to them.

After revealing the two most important qualities of an enterprise network service, Joel Snyder reviews how to provide sufficient bandwith for users' needs.

PART 4: Must-haves for wireless network security: WLAN switches, intrusion detection, and more
Devices like a WLAN switches, which can manage hundreds access points, deserve a look, especially when setting up an enterprise wireless network.

Joel Snyder reviews the switch technology and explains why intrusion detection systems and firewalls need to also be carefully added to a "defense in depth" network configuration.


About Joel Snyder
Joel Snyder is a senior partner with Opus One, a consulting firm in Tucson, Arizona. He spends most of his time helping people build larger, faster, safer and more reliable networks. He is a frequent contributor to Information Security magazine and has advised and trained thousands of people privately and at conferences around the world on networking, security, messaging and VPNs.

This was first published in November 2008

Dig deeper on Wireless LAN Design and Setup

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close