Home > Articles

  • Print
  • + Share This
This chapter is from the book

Foundation Summary

The Foundation Summary is a collection of information that provides a convenient review of many key concepts in this chapter. If you are already comfortable with the topics in this chapter, this summary can help you recall a few details. If you just read this chapter, this review should help solidify some key facts. If you are doing your final preparation before the exam, this information will be a convenient way to review the day before the exam.

Table 18-3. Comparison of Wireless LAN Security Methods

Method

Credentials Used

Data Security

Open Authentication

None

None

Pre-Shared Key (static WEP)

Static WEP key

WEP encryption (static key)

LEAP

Username/password

WEP encryption (dynamic keys)

EAP-TLS

Digital certificate

WEP encryption (dynamic keys)

PEAP

Server: Digital certificate Client: Any EAP method

WEP encryption (dynamic keys)

EAP-FAST

PAC to build tunnel; Username/password

WEP encryption (dynamic keys)

WPA

Any EAP-based method or pre-shared key

WEP encryption, per-packet keys generated by TKIP

MIC performs packet authentication for integrity

WPA2

Any EAP-based method Pre-shared key

Proactive key caching (authenticate once while roaming across APs)

AES encryption or TKIP

MIC performs packet authentication for integrity

In this table, the darker shading indicates increasing levels of security.

Table 18-4. Client Roaming Methods

Roaming Method

Description

Passive roaming

Client scans other channels to listen for beacons from candidate APs

Active roaming

Client scans other channels and sends 802.11 probe requests to find candidate APs

Table 18-5. Best Practice AP Cell Size Guidelines

AP Radio

Typical Maximum Throughput Per Cell

802.11b

6.8 Mbps

802.11g

32 Mbps

802.11a

32 Mbps

  • + Share This
  • 🔖 Save To Your Account