1 / 21

Chapter 13 802.11 Network Security Architecture

Certified Wireless Network Administrator (CWNA) PW0-105. Chapter 13 802.11 Network Security Architecture. Chapter 13 Overview. 802.11 Security Basics Legacy 802.11 Security Robust Security Traffic Segmentation Infrastructure Security VPN Wireless Security. 2.

Download Presentation

Chapter 13 802.11 Network Security Architecture

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 13 802.11 Network Security Architecture

  2. Chapter 13 Overview • 802.11 Security Basics • Legacy 802.11 Security • Robust Security • Traffic Segmentation • Infrastructure Security • VPN Wireless Security 2 Certified Wireless Network Administrator: CWNA – PW0-105

  3. 802.11 Security Basics • Data privacy • AAASegmentation • Monitoring • Policy 3 Certified Wireless Network Administrator: CWNA – PW0-105

  4. Data Privacy • About the protection of data and the prevention of unauthorized access to it • Uses encryption • RC4 • AES • Exercise 13.1 4 Certified Wireless Network Administrator: CWNA – PW0-105

  5. AAA • Authentication • Who are you? • What are you? • Authorization • What can you do? • Accounting • What did you do? 5 Certified Wireless Network Administrator: CWNA – PW0-105

  6. Segmentation • LANs • WANs • VLANs 6 Certified Wireless Network Administrator: CWNA – PW0-105

  7. Policy • Defines how computer systems must be implemented • Specific WiFi policies must be created • Traditional wired policies are not sufficient 7 Certified Wireless Network Administrator: CWNA – PW0-105

  8. Legacy 802.11 Security • Legacy authentication • Open System • Shared Key • Static WEP encryption • MAC filters • SSID cloaking or hiding 8 Certified Wireless Network Administrator: CWNA – PW0-105

  9. WEP Key and IV 9 Certified Wireless Network Administrator: CWNA – PW0-105

  10. Robust Security vs. Legacy Security 10 Certified Wireless Network Administrator: CWNA – PW0-105

  11. Robust Security Network (RSN) • 802.11-2007, originally 802.11i, define an RSN • STAs must use the 4-way handshake • STAs must use CCMP or TKIP • Pre-Shared Key (PSK) • Proprietary PSK • Dynamic PSK and Private PSK are examples • 802.1X/EAP 11 Certified Wireless Network Administrator: CWNA – PW0-105

  12. 802.1X Comparison 12 Certified Wireless Network Administrator: CWNA – PW0-105

  13. WLAN Bridging and 802.1X 13 Certified Wireless Network Administrator: CWNA – PW0-105

  14. 802.1X/EAP Architecture and Process 14 Certified Wireless Network Administrator: CWNA – PW0-105

  15. EAP Types 15 Certified Wireless Network Administrator: CWNA – PW0-105

  16. Traffic Segmentation • VLANs • Guest • Voice • Data • RBAC 16 Certified Wireless Network Administrator: CWNA – PW0-105

  17. Wireless VLANs 17 Certified Wireless Network Administrator: CWNA – PW0-105

  18. Infrastructure Security 18 Certified Wireless Network Administrator: CWNA – PW0-105

  19. VPN Wireless Security (Hotspot) 19 Certified Wireless Network Administrator: CWNA – PW0-105

  20. VPN Wireless Security (Site-to-Site) 20 Certified Wireless Network Administrator: CWNA – PW0-105

  21. Chapter 13 Summary • 802.11 Security Basics • Legacy 802.11 Security • Robust Security • Traffic Segmentation • Infrastructure Security • VPN Wireless Security 21 Certified Wireless Network Administrator: CWNA – PW0-105

More Related