Cisco无线网络管理与安全:ENWLSI实践指南

版权申诉
0 下载量 151 浏览量 更新于2024-07-04 收藏 193KB PDF 举报
"Cisco Enterprise Wireless Networks 300-430.pdf 是一份关于思科企业无线网络的详细指南,涵盖了无线网络工程师在管理和维护高级无线环境时可能遇到的各种问题和解决方案。这份文档资料主要针对cisco技术,包括了如何识别和管理 Rogue AP(未授权接入点),以及设置身份验证、授权和计费(AAA)等功能,以确保网络的安全性和性能。" 1. Rogue AP 报告:在Cisco Prime Infrastructure中,为了向高级管理层展示高严重性得分的 Rogue AP 清单,应创建“Rogue APs”报告。这将提供所有未授权接入点的详细信息,帮助监控和控制无线网络的潜在安全威胁。 2. 身份基础网络和AAA配置:当工程师设置基于身份的网络并使用ISE(Identity Services Engine)进行AAA(认证、授权、审计)覆盖时,可以改变客户端的默认设置。选项中,DNS服务器和DSCP值是两个可能用于调整客户端行为的属性。IPv6 ACL、DHCP超时和多播地址不是直接影响客户端行为的设置。 3. Rogue AP 分类:在包含已知无线网络的多租户建筑中,竞争的无线接入点在WLC(无线局域网控制器)中应被分类。分类可能包括未分类、友好和恶意。对于“rogues”,它们通常会被分类为“unclassified”或“malicious”,取决于它们的行为和网络策略。 4. Cisco Aironet 600系列Office Extend AP支持的Layer 2安全选项:在配置Cisco WLC(无线局域网控制器)以支持此类接入点时,可以使用的安全选项包括802.1X和WPA+WPA2。静态WEP,即使是与802.1X结合使用,由于安全性较低,通常不推荐。WEP(有线等效加密)已被视为不安全,而WPA+WPA2提供了更强的加密和认证。 5. RADIUS实现严格的行政控制:工程师实施RADIUS(远程用户拨入认证服务)来强化管理控制,意味着他们可能正在设置权限级别,限制不同用户或角色对网络资源的访问,以增强网络的安全性和合规性。 这份PDF文件详细介绍了企业级无线网络的管理,包括但不限于安全策略、故障排查、性能优化和网络监控,是网络工程师和管理员的重要参考资料。
2009-03-19 上传
Expert guidance for securing your 802.11 networks Learn best practices for securely managing, operating, and scaling WLANs Comprehend the security-related technological underpinnings of WLANs Explore new security protocols in 802.11i and WPA and learn how they prevent attacks Review centralized deployment models for wired/wireless integration Deepen your knowledge of defense by understanding the tools that attackers use to perform reconnaissance and to attack authentication and encryption mechanisms Understand how to design secure WLANs to support enterprise applications with the new standards and practices detailed in this book Reference the next generation authentication standards and protocols Find out about mobility, hotspots, and campus wireless networks Grasp Open Authentication, MAC-based authentication, shared key authentication, EAP authentication protocols, WEP, WPA, and 802.11i Cisco Wireless LAN Security is an in-depth guide to wireless LAN technology and security, introducing the key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect the entire network. Because a WLAN is less effective as an isolated piece of the network, this book emphasizes how to effectively integrate WLAN devices into the wired network while maintaining maximum security. Cisco Wireless LAN Security covers the spectrum of WLAN security, including protocols and specifications, vulnerabilities and threats, and, especially, deployment patterns and design guidelines. With a unique combination of theory and practice, this book addresses fundamental wireless concepts, such as WEP, and innovations, such as EAP, switching, and management. Each chapter includes detailed illustrations, checklists, design templates, and other resources. You will also find generic wireless deployment patterns based on real-world customer installations and functional examples of architecture, design, and best practices. Whether you currently design, configure, imple