How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
暫譯: 你的無線網路有多安全?保護你的 Wi-Fi LAN

Lee Barken

  • 出版商: Prentice Hall
  • 出版日期: 2003-09-05
  • 售價: $1,540
  • 貴賓價: 9.5$1,463
  • 語言: 英文
  • 頁數: 224
  • 裝訂: Paperback
  • ISBN: 0131402064
  • ISBN-13: 9780131402065
  • 相關分類: Wi-Fi
  • 已絕版

買這商品的人也買了...

商品描述

Summary

Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user.

Topics covered include--

  • Why conventional wireless LANs are so insecure--and what you can do about it
  • "Wardriving" software, equipment, and techniques: knowing your enemy
  • 802.11i, WPA, TKIP, and AES: the new wireless security options
  • 802.1x and EAP: enabling port-based authentication on your WLAN
  • Safely connecting WLANs to wired networks
  • Securing home and small office environments, one step at a time
  • Accessing VPNs from wireless devices
  • Integrating firewalls and wireless access points
  • Improving security in public access environments
  • Securing enterprise environments with 802.1x--a start-to-finish walkthrough

Table of Contents

Foreword.

Introduction.



1. The Need For Wireless LAN Security.

Security in Layers. Size Matters—What Are You Protecting? Wireless LAN 101. Shared Key Authentication. Wi-Fi Protected Access (WPA). Beware: The Walls are Listening. Stop the RF Bleeding.



2. Introduction to WLAN.

Pre-802.11. 802.11 (1997). Spread Spectrum. 801.11b. Interoperability. Critical Mass. 802.11a. 802.11g. Other Working Groups. 802.11 Specification. A Tale of Two Topologies. CSMA/CA. RTS/CTS. Fragmentation.



3. WEP Vulnerabilities—Wired Equivalent Privacy?

WEP 101. Decrypting the WEP Message. Key Management Problems. RC4 Stream Cipher. IV Collisions. Message Injection. Authentication Spoofing. Brute Force Attacks. Cracking WEP Keys. Now What?



4. War Driving: Tools And Techniques.

What Is War Driving? Wireless Sniffers. Putting It All Together. Ethical Considerations. War Chalking.



5. 802.11I, WPA, TKIP, AND AES.

WPA to the Rescue! TKIP. WPA for the Home. 802.11i and AES.



6. 802.1X Explained.

Where Did 802.1x Come From? Guilty Until Proven Innocent (or Authenticated). 802.1x Authentication Conversation. Solving Security Problems with 802.1x. But Wait, There's More! Competing Standards.



7. Connecting a WLAN to the Wired Network.

Assessing the Information Assets. A Layered Approach. Multiple SSIDs. 802.1x vs VPN. Hands-on Projects.



8. How to Deploy A VPN for Wireless Environments.

PPTP vs L2TP/IPSec. PPTP: Point-to-Point Tunneling Protocol. L2TP: Layer 2 Tunneling Protocol with IPSec. Choosing an Authentication Protocol. Building a VPN Server. Configuring the VPN Server. Configuring Clients. The Downside to VPNs.



9. How to Secure and Manage a Home Environment.

Basic Security Steps. Beyond Security: Managing the Network. AP on Steroids? Linux Embedded Appliance Firewall (LEAF). Adding Wireless Client Support to Bering. Sputnik around the World. ReefEdge Dolphin.



10. How to Secure an Enterprise Environment.

802.1x Revisited. Setting Up the Authentication Server. Configuring the CA. Configuring the Authenticator. Using EAP-TLS with Windows 2000 Server.



11. Setting Up a Secure Public Hotspot: Building A Linux-Based Access Point.

HostAP Prism Driver for Linux. NoCat. The 800-Pound Pebble. LEAF to the Rescue. Troubleshooting Tips.



Appendix A: Introduction to RF.

The History of Radio Frequency. Electromagnetism. Induction. Conduction. Radio Waves. Structure of a Wave. Modulation. Attenuation. Antennae. How Antennae Work. Different Kinds of Antennae. Antenna Types. Summary.



Appendix B: 802.11 Frame Types.

Management Frames. Control Frames. Data Frames.



Appendix C: Community Wireless Networking for Pay.

Amenity. Utility. User Groups. The Mission. The Legal Issues. Sentre Partners in San Diego. Software Options for Free Hotspots. The Big Picture.



Appendix D: Building a Pringles Can Antenna.

Shopping List. Tools You'll Need. Building the Antenna.



Index.

商品描述(中文翻譯)

摘要

現在,您可以享受無線區域網路(WLAN)的驚人好處,而不必成為其臭名昭著的安全漏洞的受害者。領先的無線安全專家 Lee Barken 向您展示了針對當今 WLAN 漏洞的實用解決方案和修復方法,介紹了市場上新推出的高安全性無線協議,並提供了保護您所有無線資訊的逐步指導,從家庭到企業。這是您一直在尋找的權威且易於使用的 WLAN 安全書籍——無論您是網路管理員、安全專家、經理還是家庭用戶。

涵蓋的主題包括:
- 為什麼傳統無線區域網路如此不安全——以及您可以採取的措施
- “Wardriving” 軟體、設備和技術:了解您的敵人
- 802.11i、WPA、TKIP 和 AES:新的無線安全選項
- 802.1x 和 EAP:在您的 WLAN 上啟用基於端口的身份驗證
- 安全地將 WLAN 連接到有線網路
- 一步一步地保護家庭和小型辦公環境
- 從無線設備訪問 VPN
- 整合防火牆和無線接入點
- 改善公共訪問環境的安全性
- 使用 802.1x 保護企業環境——從頭到尾的逐步指南

目錄

前言。

介紹。

1. 無線區域網路安全的必要性。
安全分層。大小重要——您在保護什麼?無線區域網路 101。共享金鑰身份驗證。Wi-Fi 保護存取(WPA)。小心:牆壁在竊聽。停止無線電信號洩漏。

2. WLAN 介紹。
Pre-802.11。802.11(1997)。擴頻。802.11b。互操作性。臨界質量。802.11a。802.11g。其他工作組。802.11 規範。兩種拓撲的故事。CSMA/CA。RTS/CTS。分段。

3. WEP 漏洞——有線等效隱私?
WEP 101。解密 WEP 訊息。金鑰管理問題。RC4 流密碼。IV 碰撞。訊息注入。身份驗證欺騙。暴力破解攻擊。破解 WEP 金鑰。現在該怎麼辦?

4. 戰爭駕駛:工具和技術。
什麼是戰爭駕駛?無線嗅探器。將所有內容整合在一起。倫理考量。戰爭塗鴉。

5. 802.11i、WPA、TKIP 和 AES。
WPA 救援!TKIP。家庭用的 WPA。802.11i 和 AES。

6. 802.1X 解釋。
802.1x 從何而來?在證明無罪之前都是有罪的(或已驗證的)。802.1x 身份驗證對話。用 802.1x 解決安全問題。但等等,還有更多!競爭標準。

7. 將 WLAN 連接到有線網路。
評估資訊資產。分層方法。多個 SSID。802.1x 與 VPN。實作專案。

8. 如何為無線環境部署 VPN。
PPTP 與 L2TP/IPSec。PPTP:點對點隧道協議。L2TP:帶有 IPSec 的第二層隧道協議。選擇身份驗證協議。建立 VPN 伺服器。配置 VPN 伺服器。配置客戶端。VPN 的缺點。

9. 如何保護和管理家庭環境。
基本安全步驟。超越安全:管理網路。增強型接入點?Linux 嵌入式設備防火牆(LEAF)。為 Bering 添加無線客戶端支持。全球的 Sputnik。ReefEdge Dolphin。

10. 如何保護企業環境。
重新檢視 802.1x。設置身份驗證伺服器。配置 CA。配置身份驗證器。使用 EAP-TLS 與 Windows 2000 Server。

11. 設置安全公共熱點:建立基於 Linux 的接入點。
Linux 的 HostAP Prism 驅動程式。NoCat。800 磅的卵石。LEAF 救援。故障排除提示。

附錄 A:RF 介紹。
無線頻率的歷史。電磁學。感應。導電。無線電波。波的結構。調變。衰減。天線。天線的工作原理。不同類型的天線。天線類型。總結。

附錄 B:802.11 幀類型。
管理幀。控制幀。數據幀。

附錄 C:社區無線網路收費。
便利性。效用。用戶群體。使命。法律問題。聖地亞哥的 Sentre 合作夥伴。免費熱點的軟體選項。全局視野。

附錄 D:製作 Pringles 罐天線。
購物清單。您需要的工具。製作天線。

索引。