Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

WLAN Security Monitors: Page 24 of 31

Because higher-level authentication is handled by the 802.1X/EAP framework, clients need an 802.1x supplicant (client) to validate user credentials against the authentication server. Supplicants are available from Funk Software, Meetinghouse Data Communications and other vendors for a range of OS platforms. And many Wi-Fi vendors are working on embedding the supplicant in the wireless adapter's chipset and software. And Microsoft has released a patch that adds WPA to the embedded wireless client.

Given that so much has been packaged into WPA, have WEP's wireless-security holes been sealed? The only truly secure network is an unplugged one, so there will never be a perfect security solution. Security risks can be mitigated using WPA, but it has limits.

The hardware restriction imposed on MIC affects its robustness, and this countermeasure may facilitate a DoS (denial-of-service) attack against the wireless network. Finally, since 802.11 management frames are not encrypted, the Wi-Fi network is vulnerable to malicious deauth frames, which can disconnect users from access points.

A solution for these problems is expected with the 802.11i standard. Until then, prepare by replacing legacy systems with equipment capable of supporting RSN. "Frank Robinson