
106
Chapter 5: Authentication and Encryption
AirMagnet Laptop Wireless LAN Policy Reference Guide
Being an overlay solution, Fortress Secure Gateways can be easily
deployed in any network regardless of topology, infrastructure
vendor or wireless technology being used. Whether protecting small
pockets of WLAN users, or an entire enterprise, Fortress has models
suitable for your specific requirements.
Fortress Secure Gateways provide security between wireless devices,
users and network infrastructure. All critical security operations —
encryption, authentication, data integrity checking, key exchange,
and data compression — are optimized to minimize hands-on
management. It also provides secure service for multiple access
points simultaneously and scales for various architectures.
Fortress Technologies provides a comprehensive, robust wireless
solution that is easy to implement and maintain. By securing the
device, data and network, Fortress is the strongest commercially
available security platform for wireless networks.
Please take appropriate steps to enable the use of Fortress encryption
for various devices in the wireless environment. This new security
alert identifies users who fail to run Fortress Security System. This
will allow security-conscious customers who have chosen Fortress to
verify that their authentication/encryption policies are being
followed in every installation worldwide. The combined product
offering brings together Fortress's, robust security infrastructure that
encrypts at Layer 2, eliminating the opportunity for hackers to
intercept important network data, view internal network addresses,
or interrupt availability through denial-of-service attacks, and
Fortress WMS security and performance management system, which
manages and monitors wireless security. With this solution,
organizations benefit from Fortress’s robust wireless solution that is
easy to implement and maintain, combined with the most complete
monitoring of rogues, wireless exploits and network intrusions.
Static WEP Encryption
Static WEP encryption was specified in the IEEE 802.11 standard in
1999. †Since then, several papers (for example,
Weaknesses in the Key
Scheduling Algorithm of RC4 - I by Scott Fluhrer, Itsik Mantin, and Adi
Shamir
) have been published on the vulnerabilities of this algorithm
(WEP using RC4 with static key). †For security-sensitive WLAN
deployments, other alternatives such as WPA (Wireless Protected
Access - TKIP and 802.1x) and 802.11i exist to address the encryption
tasks.
Laptop Wireless LAN Policy Reference Guide.book Page 106 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...