Legacy 802.11

CWNA Summary Notes: Legacy 802.11 Security | MAC Filters

Posted on Updated on


MAC Filtering

MAC Filtering referes to the use of MAC addresses to client devices that can authenticate to a WLAN. MAC Filtering is not defined by 802.11 Standard and any implementation of it is Vendor specific. Read the rest of this entry »

CWNA Summary Notes: Legacy 802.11 Security | Static WEP Encryption

Posted on Updated on


Static WEP Encryption

This is a layer 2 encryption method using RC4 streaming cipher.

Main goals of WEP Encryption were:

  • Confidentiality (Data privacy through encryption)
  • Access Control ( Authorization if static WEP keys match)
  • Data Integrity ( Data Integrity Check-sum is computed before encryption to ensure that the data has not been tampered with)

Can be entered as a hex (0 – 9) or ASCII (A – F) characters.

Static WEP Encryption was on 2 forms: Read the rest of this entry »

CWNA Summary Notes: Legacy 802.11 Security | Legacy Authentication

Posted on Updated on


Legacy Authentication

Legacy authentication methods were more of an authentication of capability (verification between two devices that they were valid 802.11 devices) and not so much an authentication of user identity.

They are of two types: Read the rest of this entry »