Systems and Security : Implementation
1.4 Installing and configuring wireless security settings
Methods
The methods for installing and configuring wireless security settings include:
Pre-shared key (PSK): This method uses a shared secret key that is agreed upon by the wireless access point (AP) and the wireless client. The secret key is used to encrypt and decrypt wireless traffic, providing a basic level of security. There are two types of PSK: personal (for home use) and enterprise (for business use). The personal PSK is easier to set up, but less secure than the enterprise PSK, which requires a RADIUS server to authenticate clients.
WiFi Protected Setup (WPS): This is a simple method of setting up a secure wireless network without the need to manually configure encryption keys. It uses a combination of push-button and PIN methods to securely connect a client device to the AP.
Captive portals: This method is commonly used in public places like coffee shops, hotels, and airports. A captive portal is a web page that is displayed when a client device connects to a wireless network. The user must authenticate or accept terms and conditions before they can access the internet.
In summary, EAP works with any authentication server, not just RADIUS. However, the authentication server that is used in conjunction with EAP may vary depending on the method used to set up wireless security.
Installation considerations
-Site surveys
-Heat maps
-WiFi analyzers
-Channel overlaps
-Wireless access point (WAP) placement
-Controller and access point security