A Field Guide To Wireless LANs for Administrators and Power Users 100
A Field Guide To Wireless LANs for Administrators and Power Users | |
author | Thomas Maufer |
pages | 333 |
publisher | Prentice Hall/PTR |
rating | 8 |
reviewer | Ray Janus |
ISBN | 0131014064 |
summary | This book takes you under the hood of WLAN technology, providing detailed insights and recommendations along the way. |
This book starts out an excellent historical overview of the evolution of local area networks and the migration of TCP/IP technology to a wireless environment. In the process, it provides a definitive reference manual on the 802.11 protocol stack, discussing the evolution and future direction of this standard. The issues associated with reliably transmitting data in the very chaotic wireless world are discussed, but the real meat comes in the book's addressing of the logic behind the radio circuitry in WLANs. Along with these insights that an RF engineer will love, the book is a great guide for anyone with protocol analysis tools looking at wireless traffic, especially given the clear illustrations in the text.
Acknowledging the rapid evolution of 802.11 standards over the last few years, an excellent summary is provided, from the venerable 802.11b standard through the -a and -g standards, and moving into future standards being developed by the 802.11 TGs. Maufer provides some key insights on future directions and capabilities of WLANs, too.
The book covers the principal areas of wireless networking, including security, the hot topic for every LAN administrator. While the book does a great job of addressing the theoretical security issues (and other aspects of wireless LANs operation), it is light on practical recommendations in day-to-day WLAN management. The Guide delves into creating strong passwords for use with WLANs, though, and addresses the strengths and weaknesses of the WEP architecture. It is especially rich in providing insights into the handshake and authentication procedures within WEP. A number of proposed security enhancements are discussed, including the deployment of RADIUS servers to provide authentication in enterprise WLANs. In closing on this section, Thomas provides good insights into WPA, which is becoming the future standard to WLAN security.
For a WLAN component designer, this is probably one of the best reference guides available, and this is also true for power users who really want to get under the hood of today's WLAN systems. However, for a network administrator seeking advice on how to address a herd of WLAN devices, my recommendation would be to seek elsewhere. Maufer offers little information about vendors' product types/models, making the detailed technology discussions independent of real-world products. For the administrator able to glean the technical details of their chosen WLAN products elsewhere, though, this book can be an invaluable guide in deciding the pros and cons of a particular product solution.
Along the way, Maufer provides a series of helpful screenshots, as guides to the technical discussions addressed in the various chapters. He provides a very balanced overview in the use of WLAN technologies for Apple, Linux and Windows platforms.
I recommend this Guide as an excellent text, rich in technical details, and protocol/logic illustrations. A "must read" for understanding WLAN technology in depth. With the rapid advances in WLAN technology, this book represents a excellent benchmark on 802.11 technology, from the perspective of its 2004 timeframe, and a sequel from the author would be an excellent additional resource for WLAN system designers and architects.
You can purchase A Field Guide To Wireless LANs for Administrators and Power Users from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
MOD DOWN: Parent is karma-whoring troll (Score:2, Informative)
Chapter one: (Score:1)
/30
Re:MOD DOWN: Parent is karma-whoring troll (Score:1)
And securityworm stole them from here [amazon.com] (and I see no attribution, so I say stole)
What text was stolen? Seems you're self-promoting (Score:2)
Really? I read both quickly, I couldn't find the supposed "stolen" review. To be honest, it seems like you're just trying to promote securityworm, especially since you're posting anonymously.
Re:What text was stolen? Seems you're self-promoti (Score:1)
Sorry that you're ridiculous copying was found out? Awww too bad.
(If you are not Lichen, then you're fucking blind. Either way, your a tool)
Re:Got this as gift after finishing my CCNA traini (Score:2, Funny)
Thats ok, at that point you'll be properly online with your spiffy wireless connection, and able to steal the revised eBook edition!
I want... (Score:2, Interesting)
It doesn't sound like this is it, or is it?
Re:I want... (Score:4, Informative)
Consider this:
You threats are minimal, limited to those people close enough to pick up a signal. Real but nothing compared to exposure from the internet.
The encryption is now really good. I am sure someone can break it with enough time but not a serious enough threat to worry. It would be much easier to hop on the wired network and sniff.
Authentication is now good to excellent depending on the protocol you use.
Man in the middle is now impossible as long as you are properly verifying the certificates and keep your CA safe.
Use existing VPN technologies to Secure WiFi (Score:4, Insightful)
Rather than succumbing to the hassle of the various emerging authentication schemes, I've had good luck in convincing my clients to deploy their WiFi networks behind a VPN concentrator. (Or in cases where they wanted WiFi internet access for guests, putting the WiFi outside their firewall, and having the corporate users come in through a VPN concentrator.)
This is a far simpler, and equally secure method.
Re:Use existing VPN technologies to Secure WiFi (Score:3, Informative)
I would look again at WPA, it is past the emerging stage now and is well supported under XP and Mac OS X. Win 2K does it well also if y
Re:Use existing VPN technologies to Secure WiFi (Score:2)
Just install firmware that supports OpenVPN and pptp on the access points -- problem solved. $50 AP hardware like the WRT54G is quite capable of running dozens of secure tunnels. We even host our internet-facing website off the RAM off what used to be a WAP, they are quite resilient and flexible little devices.
Re:Use existing VPN technologies to Secure WiFi (Score:1)
Running Linux on a WAP, iPod, wristwatch or toaster is a lot of fun. I enjoy these kind of projects very much. But I am talking enterprise solution.
This requires seamless operation, centralized user management and easy setup so helpdesk people can give rights in Active Directory (or similar) just by adding someone to a group. OpenVPN is a great project but does not give this. Getting a windows client installed and telling an Exec to *gasp* modify a config file is
Re:I want... (Score:3, Informative)
Oh, wait... do you want your boss to read it?
Re:I want... (Score:1)
Has anyone here read it yet? The reviews [amazon.com] are mixed, some saying it's to cursory.
Security (Score:1)
Re:Security (Score:1)
Re:Security (Score:1)
Existing wireless LAN security standards (Score:5, Insightful)
But it IS on topic in this article. (Score:2)
But in this article it's on topic.
VPN isn't always an option. (Score:3, Informative)
Re:VPN isn't always an option. (Score:4, Informative)
For starter, you could use a POP3 server that use encryption. Courier-pop3 server, for instance, supports both TLS (over the usual port 110) and SSL using port 993.
The Mozilla Thunderbird (free and nice client) and Outlook can use POP3 over SSL, so your POP3 password is encrypted. KMail and Sylpheed-claws supports both.
As for sending mail, you can configure your mail server to use STARTTLS, and once again, no passwords in the clear.
If your favourite POP3 server does not offer encryption, ditch it.
If you want to test encryption, get a free account at www.myrealbox.com that support various encryptions. Fire up your tcpdump, and try sniff the mailtraffic.
Re:VPN isn't always an option. (Score:1)
Anyway, I'm perfectly aware of how to secure my POP3/IMAP/Sendmail traffic. That doesn't mean my Mom is. There are more people like my Mom out there at Starbucks checking their email than there are like me.
Re:VPN isn't always an option. (Score:2)
You can also use a wrapper program like Stunnel [stunnel.org] if you don't want to ditch your existing software. Stunnel allows you to use SSL with almost anything, including proprietary apps. I've used it with POP servers and it works reliably.
Re:VPN isn't always an option. (Score:2, Insightful)
Exactly: All thru VPN tunnel, use work as proxy. (Score:5, Informative)
That's the way to go: Use an encrypted tunnel to work (or home or wherever) and use the site at the other end of the tunnel as your forwarder/proxy for everything.
[...]VPN [rather than other fancy stuff] should [also] be the right answer [for in-building wireless].
Again dead on. In-building wireless doesn't STAY in-building. So treat it like the general internet, put it on the OUTSIDE of your firewall, and secure-tunnel through for access inside.
Option 1: You can treat your APs and the general Internet as TWO separate external nets, both outside your firewall. Then your laptop has to tunnel in and authenticate to make any use of the AP, effectively becoming wired to your lan.
Option 2: You can treat them as ONE outside-the-firewall net, routing packets between them as well as from each to your firewall. Then you become a hot-spot, and visitors (customers, vendors, partners) can also use THEIR laptops to VPN to THEIR private nets (or surf the web B-) ) without having privileges on YOUR local net.
For option 2 you can use WEP as a no-tresspassing sign (post the netname and current password or have them get it from security or their inside contact), set up some other authentication mechanism, or leave your APs open (if you want to do your neighbors a service).
Re:VPN isn't always an option. (Score:1)
You're probably right. My VPN connection isn't the proper VPN for properly securing wireless connections.
But my point still stands, VPN isn't a solution for everyone. Not everyone has access to one or knows how to set one up properly. Same can go for Wireless security though... Setting up a Radius server and an Access Point to use it isn't a task my Mom can do. And I think
Sounds like you need a new VPN solution... (Score:2)
What are you guys using for VPN connectivity?
this book is outstanding (Score:2, Insightful)
Re:this book is outstanding (Score:2, Informative)
Re:this book is outstanding (Score:3, Funny)
Chapter One: Never Tell Anyone Your Real Name
Re:REPOST WHORE ALERT (Score:1, Informative)
...under different UID's
and published [slashdot.org] them [slashdot.org] again. [slashdot.org]
...gaining nice karma
Duh... (Score:5, Funny)
Duh, it's magic...
Itallics (Score:1, Offtopic)
Who is getting sloppy with their HTML?
magic? You can't fool me. (Score:1, Funny)
Well there's this plug for the cable(with eight pins instead of 4 for much more speed!), a radio thingy, and lots of little electronical chip things, and they make the wire talk to the air using the antenna. I heard some of them have a little penguin inside to help move the webpages around and deliver my email. Not that complicated, really.
Re:magic? You can't fool me. (Score:4, Funny)
Open Letter to Copy/Paste Trolls: (Score:2)
To follow up. (Score:2, Funny)
Slashdot bug (Score:2)
not totally secure, just less attractive to attack (Score:5, Insightful)
Casual war-driving studies have been done in the past, and if I remember correctly, on average 60% of APs that were broadcasting were still in their default out-of-box configuration (no WAP, no MAC filtering, default password for adminstration). If you just enable WAP (please use a good random key generator, folks), and MAC filtering, more than likely it just won't be worth it for somebody to try to break in to access your network.
Also, just in case somebody does break into your AP and does something nasty, this is what the daily logs are for, so enable logging on your AP and back them up to disk regularly. Because, yes, you are responsible what goes through your connection, so you better be able to prove there was unauthorized entry, limiting your liability.
Re:not totally secure, just less attractive to att (Score:1)
It'll make it take longer... still not long enough, but longer.
this is my textbook... (Score:1)
Rule #1 of Computer Books: (Score:2)