![Cisco Aironet 1200 Series Software Configuration Manual Download Page 121](http://html.mh-extra.com/html/cisco/aironet-1200-series/aironet-1200-series_software-configuration-manual_66110121.webp)
4-3
Cisco Aironet 1200 Series Access Point Software Configuration Guide
OL-2159-03
Chapter 4 Security Setup
Security Overview
If you don’t enable any security features on your access point, anyone with a
wireless networking device is able to join your network. If you enable open or
shared-key authentication with WEP encryption, your network is safe from casual
outsiders but vulnerable to intruders who use a hacking algorithm to calculate the
WEP key. If you enable server-based EAP authentication with Message Integrity
Check (MIC), Temporal Key Integrity Protocol (TKIP, also known as key
hashing), and broadcast key rotation, your network is safe from all but the most
sophisticated attacks against wireless security.
Encrypting Radio Signals with WEP
Just as anyone within range of a radio station can tune to the station’s frequency
and listen to the signal, any wireless networking device within range of an access
point can receive the access point’s radio transmissions. Because WEP (Wired
Equivalent Privacy) is the first line of defense against intruders, Cisco
recommends that you use full encryption on your wireless network.
WEP encryption scrambles the communication between the access point and
client devices to keep the communication private. Both the access point and client
devices use the same WEP key to encrypt and unencrypt radio signals. WEP keys
encrypt both unicast and multicast messages. Unicast messages are addressed to
just one device on the network. Multicast messages are addressed to multiple
devices on the network.
Extensible Authentication Protocol (EAP) authentication provides dynamic WEP
keys to wireless users. Dynamic WEP keys are more secure than static, or
unchanging, WEP keys. If an intruder passively receives enough packets
encrypted by the same WEP key, the intruder can perform a calculation to learn
the key and use it to join your network. Because they change frequently, dynamic
WEP keys prevent intruders from performing the calculation and learning the key.
Additional WEP Security Features
Three additional security features defend your wireless network’s WEP keys:
•
Message Integrity Check (MIC)—MIC prevents attacks on encrypted packets
called
bit-flip
attacks. During a bit-flip attack, an intruder intercepts an
encrypted message, alters it slightly, and retransmits it, and the receiver
accepts the retransmitted message as legitimate. The MIC, implemented on