
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 5: Authentication and Encryption
109
TKIP (Temporal Key Integrity Protocol) encryption mechanism,
which is now supported by most enterprise-level wireless
equipment. TKIP-enabled devices are not subject to any such WEP
key attacks.
Device Using Open Authentication
802.11 Open Authentication (as opposed to Shared-key
authentication) is widely used today in conjunction with a higher-
level authentication protocol such as 802.1x to secure a WLAN. In
some deployments, Shared-key Authentication where a static WEP
key is used to challenge client stations attempting to associate with
the AP is used instead of Open Authentication. Open
Authentication, on the other hand, accepts associations from any
client and there is no verification of the client's identity. Shared-key
authentication appears to be more secure but actually has been
proven to be vulnerable to WEP key cracking by wireless intruders
because the challenge text and response are both clear and
unencrypted. This means that the information is easily intercepted
and interpreted by anyone with the appropriate software.
The recommended practice is to use 802.11 Open Authentication with
some higher-level authentication mechanisms, such as the 802.1x/
EAP framework or VPN. In case your deployment chooses to use
Shared-key Authentication or something other than Open
Authentication, you can enable this alarm to have AirMagnet Mobile
alert you whenever it detects any device that violates your
deployment policy of not using Open Authentication.
Device Using Shared Key Authentication
The IEEE 802.11 standard designed the Shared-key Authentication
protocol to work with static
WEP
key encryption to lock out
unauthorized WLAN devices from associating with an AP or ad-hoc
station. It is a simple 4-packet exchange challenge/response protocol
as illustrated below:
Laptop Wireless LAN Policy Reference Guide.book Page 109 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...