
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 1: Configuration Vulnerabilities
21
between the client and the server using a PAC (Protected Access
Credential) to authenticate each other. After the tunnel establishment
process, the client is then authenticated using the user-name and
password credentials.
Some of the major advantages of EAP-FAST are that it is not
proprietary, is compliant with the IEEE 802.11i standard, supports
TKIP and WPA, does not use certificates thus avoiding complex PKI
infrastructures and supports multiple Operating Systems on the PCs
and the Pocket PCs.
AirMagnet
Mobile
alerts the wireless administrator on devices that
are using LEAP and are vulnerable to the ASLEAP attack and are
under the risk of exposing their user-name and password
information. It is recommended that EAP-FAST be implemented in
the wireless environment.
Laptop Wireless LAN Policy Reference Guide.book Page 21 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...