I don't recommend the use of WEP, which is easily cracked. Instead, use Wireless Protected Access (WPA) or the...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
newer WPA2 based on the 802.11i security standard. WPA adds rotating keys to WEP, eliminating the obvious vulnerability, and WPA2 is based on an entirely different security standard, AES. WPA2 may require new hardware, however. Regardless, the use of a VPN like IPsec, or other upper-layer security mechanism is always recommended, because it allows security to be end-to-end. WLAN security of any form only secures the airlink, and thus does not address the non-WLAN portions of your network. Finally, the use of strong authentication based on 802.1X or similar is recommended. I personally use two-factor authentication which includes a hardware token, as well as 1024-bit end-to-end encryption. But, then, I'm just a little paranoid...
Related Q&A from Craig Mathias
Learn the difference between Wi-Fi and wireless broadband, discover how the two technologies can work together at a client site and understand the ...continue reading
Discover how to troubleshoot an IP address conflict at a client site involving DHCP-assigned IP addresses.continue reading
While you can connect a printer to your client's wireless network using a wireless print server, learn why you should first make sure all your other ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.