Legacy authentication methods were more of an authentication of capability (verification between two devices that they were valid 802.11 devices) and not so much an authentication of user identity.
They are of two types: Read the rest of this entry »
Components of a Secure Network
Required components when securing a network are:
Data Privacy and Integrity
Access to Wireless medium is unrestricted hence the use of cipher encryption technologies is needed for proper data privacy.
A cipher is an algorithm that is used to perform encryption:
- RC4 algorithm ( Ron’s Code / Rivest Cipher)
- It encrypts data in a continuous stream (streaming cipher)
- Used in technologies used to protect Internet traffic eg SSL (Secure Socket Layer)
- Incorporated into 2 legacy encryption methods: WEP and TKIP
- Advanced Encryption Standard Algorithm (AES) / Rijndael Algorithm
- Encrypts data in fixed blocks
- Much stronger than RC4
- Uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) encryption method
- Encryption key strength options are 128, 192 or 256 bits.
G00-2921-01/29(config)username admin privilege 15 secret 0 admin
G00-2921-01/29(config)enable secret 123456
Enable AAA on the Router
G00-2921-01/29(config)#aaa new-model Read the rest of this entry »