O'Reilly logo

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN by CCNA Lee Barken - CISSP MCP, CPA

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Solving Security Problems with 802.1x

802.1x can also be used to securely distribute per-station or per-session keying material. Remember that in a legacy WEP environment, everybody had the same shared secret WEP key. Now, with 802.1x, each client could have his or her own shared secret WEP key. This way, even if you successfully used a WEP cracking tool, you would only be recovering the key used for one particular user or session.

Unlike traditional WEP, which used the same shared secret for all users and sessions, 802.1x compromised keys could not be used to decrypt all the network traffic. This technique is commonly referred to as dynamic WEP and is used to mitigate some of the risks involved with WEP and its many publicized vulnerabilities. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required