WiFoo..The.Secrets.of.Wireless.Hacking [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

WiFoo..The.Secrets.of.Wireless.Hacking [Electronic resources] - نسخه متنی

Andrew A. Vladimirov

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید







Summary


As this chapter makes clear, you must consider many factors when selecting WLAN architecture and products. It is not as simple as picking a Wi-Ficertified AP, or choosing one based solely on cost. Doing so will probably result in a system that is far less productive and useful than desired. Take special care in this selection process to ensure you can support all the users, applications, and features, as well as future growth.

Here are several key hints for a successful selection:

Treat WLANs as building blocks. From an architectural perspective, WLANs must be thought of as another enterprise building block, not as yet another remote-access technology that can be DMZed. This does not mean that proven components of the DMZ building block, such as VPNs and firewalls, must be eliminated. Instead, they need to be rearchitected for the mobility and scaling requirements of WLANs.

Understand how the WLANs will connect to the existing wired network. Interworking issues between wired and wireless networks must be minimized with few changes to the production wired network. This will make the addition much easier for the support staff.

Realize that security is a process with dynamic requirements. Security in WLAN systems is no exception to this rule. Today's best practice (TKIP/WPA) is tomorrow's security history. Review and revise deployment decisions often.

Centralize upgrades and manageability. The life cycle and the operational costs of keeping a WLAN system primed for security and technology upgrades must be considered. Upgrades are ongoing, and IT staff must consciously avoid devoting their capital dollars to approaches that do not allow for simple scalability or permit ongoing change. Leveraging best of breed in upgrades for both software and hardware is vital for future growth and scalability.

Strive for minimal client configuration. Consider standards-based and nonproprietary authentication types that are part of the client operating system. Trying to fix interoperability issues across PDAs, notebooks, and other clients with different proprietary features might prove a big challenge.

Look for comprehensive WLAN debugging capabilities. Wireless users often have problems troubleshooting at multiple levels, from the RF layer through to 802.1x or IPSec-based VPNs. To improve troubleshooting for the WLAN, pay special attention to capabilities that can quickly help identify and pinpoint issues in the different WLAN building blocks.

Do not forget RF tools to control air space and maintain WLAN health. WLAN security depends on wireless tools that not only lock out and identify locations of rogue APs but also permit ongoing audits of air space. Also use site survey tools to better anticipate WLAN installations and thus avoid overengineering the WLAN network (that is, avoid overspending).



/ 165