Flylib.com
Deploying Secure 802.11 Wireless Networks with Microsoft Windows
Deploying Secure 802.11 Wireless Networks with Microsoft Windows
ISBN: 0735619395
EAN: 2147483647
Year: 2000
Pages: 123
Authors:
Joseph Davies
BUY ON AMAZON
Cover
LOC
Introduction
How This Book Is Structured
Additional Resources
Conventions Used in This Book
Chapter 1 - IEEE 802.11 Overview
IEEE 802.11 Standards
802.11 Wireless LAN Components
IEEE 802.11 Operating Modes
Summary
Chapter 2 - Wireless Security
Wireless Security with the IEEE 802.11 Standard
Authentication with the IEEE 802.1X Standard
Wi-Fi Protected Access
Recommended Security Configurations
Attacks on Wireless Networks
Summary
Chapter 3 - Windows Wireless Client Support
Windows XP (Prior to SP1)
Windows XP (SP1 and Later) and Windows Server 2003
Windows 2000 Family
Configuring Windows Wireless Clients
Summary
Chapter 4 - RADIUS, IAS, and Active Directory
RADIUS
IAS
Active Directory
Summary
Chapter 5 - EAP
EAP Types in Windows
EAP over RADIUS
PEAP
Summary
Chapter 6 - Certificates and Public Key Infrastructure
Certificates
Public Key Infrastructure
Certificate Revocation
Certificate Validation
Windows Certificate Support
Obtaining a Certificate for IEEE 802.1X Authentication
Computer Authentication and User Authentication
Group Policy and IEEE 802.1X Authentication
Using Third-Party CAs for Wireless Authentication
Summary
Chapter 7 - Wireless AP Placement
Wireless LAN Design Considerations
Deploying Your Wireless APs
Summary
Chapter 8 - Intranet Wireless Deployment Using EAP-TLS
Required Components
Configuring the Certificate Infrastructure
Configuring Active Directory for Accounts and Groups for Wireless Access
Configuring the IAS Servers
Configuring Wireless Network (IEEE 802.11) Policies Group Policy Settings
Configuring Wireless Access Points
Configuring Wireless Client Computers
Summary
Chapter 9 - Case Study: The Microsoft Wireless Network
History of the Microsoft Wireless LAN
Design and Deployment Considerations
Deploying the Wireless Network
Current Deployment and Infrastructure
Summary
Chapter 10 - Intranet Wireless Deployment Using PEAP-MS-CHAP v2
Required Components
Configuring Active Directory for Accounts and Groups for Wireless Access
Configuring the IAS Servers
Configuring Wireless Network (IEEE 802.11) Policies Group Policy Settings
Configuring Wireless Access Points
Configuring Wireless Client Computers
Summary
Chapter 11 - Additional Intranet Wireless Deployment Configurations
Internet Access for Business Partners
Cross-Forest Authentication
Using RADIUS Proxies to Scale Authentications
Using EAP-TLS and PEAP-MS-CHAP v2
Summary
Chapter 12 - Secure Wireless Networks for the Home and Small Business
Enable and Configure Security on Your Wireless Network
Wireless Security
Using the Windows XP WZC Service
Setting Up a Wireless Network with a Wireless Access Point
Setting Up a Wireless Network Without a Wireless Access Point
Summary
Chapter 13 - RADIUS Infrastructure for Public Place Deployment
Components of a RADIUS Infrastructure for Public Place Wireless Access
Wireless ISP Configuration
Service Provider Configuration
Private Organization Configuration
Summary
Chapter 14 - Troubleshooting the Windows Wireless Client
Troubleshooting Tools
Common Connectivity and Authentication Problems
Summary
Chapter 15 - Troubleshooting the Wireless AP
Wireless AP Troubleshooting Tools
Common Wireless AP Problems
Summary
Chapter 16 - Troubleshooting the Authentication Infrastructure
IAS Troubleshooting Tools
Troubleshooting IAS Authentication and Authorization
Troubleshooting Certificate-Based Validation
Troubleshooting Password-Based Validation
Common Authentication Problems
Summary
Appendix A - Wireless Deployment Best Practices
Security
PKI
Wireless APs
Wireless Network Adapters
Active Directory
RADIUS
Performance
Scalability
Appendix B - Wireless ISPs and Windows Provisioning Services
Windows XP Wireless Provisioning Services
Appendix C - Setting Up Secure Wireless Access in a Test Lab
PEAP-MS-CHAP v2 Authentication
EAP-TLS Authentication
Summary
Deploying Secure 802.11 Wireless Networks with Microsoft Windows
ISBN: 0735619395
EAN: 2147483647
Year: 2000
Pages: 123
Authors:
Joseph Davies
BUY ON AMAZON
Strategies for Information Technology Governance
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governance in IT Outsourcing Partnerships
The Evolution of IT Governance at NB Power
Governance Structures for IT in the Health Care Industry
Metrics and Models in Software Quality Engineering (2nd Edition)
Summary
Fundamentals of Measurement Theory
Ishikawas Seven Basic Tools
Scatter Diagram
Exponential Distribution and Reliability Growth Models
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Individual change
Organizational change
Restructuring
IT-based process change
Data Structures and Algorithms in Java
The Java Collections Framework: A First Look
Problems
The Set Interface
String Matching
A.2. Variables and Types
Programming Microsoft ASP.NET 3.5
Working with the Page
The ADO.NET Object Model
ASP.NET Iterative Controls
ASP.NET State Management
Working with Web Services
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Working with the Worksheets, Charts, and Sheets Collections
Ways to Customize Word
Form Security
Using Windows Forms in VSTO
Conclusion
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies