Validating identity on wireless network

Rated 4.17/5 based on 798 customer reviews

In this case, the enterprise uses the VPN authentication mechanism, such as using extended authentication (XAUTH) with the Challenge-Handshake Authentication Protocol (CHAP) to authenticate users. EAP is an authentication framework that defines a way to encapsulate different authentication methods.

We recommend the EAP types listed in Table 1 because they are widely available and exhibit low to moderate risk.

Lessons 2 and 3 focus on how to protect users and the network, respectively. Federal Treasury may be different from best practice for a fast-food retailer.

WEP was initially replaced by the interim WPA security certification and then by the WPA2 security certification (based on 802.11i standard).

We recommend the following best practices: This lesson describes best practices for maintaining strong user authentication and data privacy on a WLAN.

Authentication Establishing a user's identity is the first step to controlling access to network resources.

An overlay WIDS solution relies upon dedicated, distributed hardware sensors that look like APs.

The sensors continuously monitor multiband channels and report anomalies back to a centralized management console.

Leave a Reply