An overlay WIDS solution relies upon dedicated, distributed hardware sensors that look like APs.The sensors continuously monitor multiband channels and report anomalies back to a centralized management console.We recommend the following best practices: This lesson describes best practices for maintaining strong user authentication and data privacy on a WLAN.
For example, "use Wi-Fi Protected Access 2 (WPA2) security" is a technology best practice, whereas "train employees not to connect to ad hoc WLANs" is a procedural best practice.
Network discovery Network intruders use a variety of methods to discover the existence of WLANs and their corresponding service set identifiers (SSIDs).
In addition, the cyclic redundancy check (CRC) used with WEP is vulnerable because it is possible for an intruder to modify a frame without the CRC detecting the modification.
WEP was initially replaced by the interim WPA security certification and then by the WPA2 security certification (based on 802.11i standard).
This type of wireless connection can lead to a man-in-the-middle attack.
A wireless intrusion detection system (WIDS) can monitor for rogue APs and unauthorized devices, maintain policy adherence, and look for anomalous or suspicious behavior.
This three-part expert lesson provides best practices for securing a WLAN in the enterprise.
Lesson 1 focuses on methods of systematically monitoring your WLAN for intruders and ways to proactively reduce network discovery.
In this case, the enterprise uses the VPN authentication mechanism, such as using extended authentication (XAUTH) with the Challenge-Handshake Authentication Protocol (CHAP) to authenticate users. EAP is an authentication framework that defines a way to encapsulate different authentication methods.