
104
Chapter 5: Authentication and Encryption
AirMagnet Laptop Wireless LAN Policy Reference Guide
(authentication and encryption) include mis-configurations, out-of-
date software/firmware, and suboptimal choice of corporate security
policy. AirMagnet Mobile alerts the administrator on these issues and
provides countermeasures.
Other Encryption and Authentication Methods
AirMagnet Mobile security offerings cover most standard
technologies such as WEP, 802.1x, TKIP, and VPN. AirMagnet
Mobile also supports proprietary security technologies (such as those
provided by Cranite Systems, Inc. or Fortress Technologies, Inc.)
deployed by AirMagnet customers. These alarms are not enabled by
default, so if your network utilizes any non-standard security
technologies, you must enable the appropriate alarms to ensure that
AirMagnet Mobile monitors your network accordingly.
Device Unprotected by Other Encryption
If your WLAN security deployment mandates the use of encryption
technologies provided by Cranite Systems, Inc., you may enable this
AirMagnet
Mobile
alarm to alert you on devices that are
participating in WLAN communication without Cranite encryption.
Cranite's WirelessWall software provides robust wireless security,
seamless mobility and increased network visibility, while meeting
the government's stringent FIPS 140-2 security standard. It encrypts
full Ethernet frames, rather than just IP payloads, hiding vital
information such as IP addresses, applications and ports from
unauthorized listeners. Frame-level encryption also protects non-
data network traffic, including DHCP requests or ARP messages,
from being compromised and used to attack the network. Unlike
IPSec-based solutions, frame-level encryption allows the easy native
use of other protocols such as IPX and AppleTalk.
Laptop Wireless LAN Policy Reference Guide.book Page 104 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...