
112
Chapter 5: Authentication and Encryption
AirMagnet Laptop Wireless LAN Policy Reference Guide
•
L2TP
- Layer 2 Tunneling Protocol
•
PPTP
- Point to Point Tunneling Protocol
•
SSH
- Secure Shell
Device Unprotected by VPN
If your WLAN security deployment requires the use of VPN,
AirMagnet can alert you on devices that participate in wireless
communication without VPN protection. Using VPN protection in
your WLAN network can help provide system and user
authentication, create dynamic keys for encryption, and provide
access control and (most importantly) Quality of Service (QoS).
Using VPN in addition to WEP in the network also provides
encryption all the way to the VPN gateway. This can be very effective
for travelling employees who use hotspot networks.
AirMagnet Mobile recognizes VPN implementations using IPSec,
PPTP, L2TP, and SSH as the tunneling protocols. Alarms are
triggered when devices communicate with each other without any
VPN protection. Please note that AirMagnet Mobile will not be able
to trigger this alarm if 802.11 encryption such as 802.1x or TKIP is also
deployed on your WLAN.
You may disable this AirMagnet
Mobile
alarm if you do not deploy
VPN as part of your WLAN security infrastructure.
Laptop Wireless LAN Policy Reference Guide.book Page 112 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...