Ipsec Over Wlan; Tips For Handling Keys; The Security Settings Wizard - Lancom l-54ag User Manual

Hide thumbs Also See for l-54ag:
Table of Contents

Advertisement

LANCOM L- 54ag Wireless – LANCOM L- 54g Wireless – LANCOM IAP- 54 Wireless
Chapter 5: Security settings
Moreover, this technology makes enables a secured dispatch and a regular
automatic change of WEP keys. In this way IEEE 802.1x improves the protec-
tion efforts of WEP.
In Windows XP the IEEE-802.1x technology is already integrated by default.
For other operating systems 802.1x client software is available.
5.1.6

IPSec over WLAN

By means of IPSec over WLAN a radio network can be optimally secured in
addition to the already introduced securing mechanisms.
In order to run IPSec over WLAN you have to upgrade the base stations of the
with the LANCOM VPN option and the LANCOM Advanced VPN Client, which
runs under the operating systems Windows 98ME, Windows 2000 and Win-
dows XP. For other operating systems client software from other manufactur-
ers is available. The drivers for the LANCOM AirLancer wireless adapter are
already equipped with a 802.1x client.
5.1.7

Tips for handling keys

The security of encryption procedures can be substantially increased the by
paying attention to some important rules for handling keys.
5.2

The security settings wizard

Access to the configuration of a device permits not only to read out critical
information such as WEP key or Internet password. Rather, also the entire set-
tings of the security functions (e.g. firewall) can be altered then. So an unau-
thorized configuration access endangers not only a single device, but the
entire network.
44
Keep keys as secret as possible.
Never note a key. Popular, but completely unsuitable are for example:
notebooks, wallets and text files in PCs. Do not share a key unnecessarily.
Select a random key.
Use randomized keys of character and number sequences. Keys from the
general linguistic usage are insecure.
Change a key immediately in case of suspicion.
It is time to change the key of the Wireless LAN if an employee with access
to a key leaves your company. The key should also be renewed in case of
smallest suspicion of a leak.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

L-54gIap-54

Table of Contents