Security Solutions

3-19
Designing Access Controls
Choose the Access Control Methods
The remainder of this section outlines the factors you should consider when
selecting authentication and encryption methods for public or private wireless
zones.
Public Wireless Zones. With a public wireless network, the goal is usually
to provide convenient access for guests, rather than to provide strong security.
Because guests cannot access sensitive materials or confidential information
on your network, you do not need to worry about protecting the data that they
access.
If you are selecting an access control method for a public wireless zone, you
might not even enforce authentication, or you might use Web-Auth, which
does not require encryption on its own. If you decide to require encryption,
you might be willing to select a weak encryption method, such as static WEP,
which all wireless NICs support.
Private Wireless Zones. For private wireless zones, you should typically
impose the tightest access control and encryption methods possible—802.1X
with WPA/WPA2.
To determine whether your environment supports this option, ask these
questions:
Web-Auth None by default
Optional encryption
possible, depending
on AP
Ideal for public zones
User-based authentication
No configuration on
endpoints—unless using
optional encryption
No 802.1X supplicant required
Web browser and user
interaction required—no
headless devices
No encryption by default
RADIUS server required
No seamless roaming
MAC-Auth (local
and RADIUS)
Optional encryption
possible, depending
on AP
Control over which endpoints
connect to the network
No software on the endpoint
Possible to combine this
method with another access
control method
Not scalable
High administrative
overhead
Susceptible to spoofing
Hardware-based, rather
than user-based,
authentication
None Static WEP
WPA/WPA2 with
Preshared Key (PSK)
–TKIP
CCMP-AES
No 802.1X supplicant required
Less configuration on endpoint
No RADIUS server required
Static WEP is easily cracked
No user-based or
centralized authentication
No dynamic settings
Easily compromised
password (same for all
users)
Authentication
Method
Encryption Options Advantages Disadvantages