Page 253 - StudyBook.pdf
P. 253

Communication Security: Wireless • Chapter 4  237


                      ■  Enable MAC filtering. It is true that MAC addresses can be easily spoofed,
                         but your goal is to slow down potential attackers. If MAC filtering is too
                         much of an administrative burden, consider using port-based authentica-
                         tion available through 802.1X.
                      ■  Consider placing your wireless network in a Wireless Demilitarized Zone
                         (WDMZ), separated from the corporate network by a router or a firewall.

                      ■  In a WDMZ, restrict the number of hosts on the subnet through an
                         extended subnet mask, and do not use DHCP.

                      ■  Learn how to use site survey tools such as NetStumbler, and conduct fre-
                         quent site surveys to detect the presence of rogue APs and vulnerabilities
                         in your own network.

                      ■  Do not place the AP near windows.Try to place it in the center of the
                         building so that interference will hamper the efforts of wardrivers and
                         others trying to detect your traffic. Ideally, your wireless signal would
                         radiate only to the outside walls of the building and not beyond.Try to
                         come as close to that ideal as possible.

                      ■  If possible, purchase an AP that allows you to reduce the size of the wire-
                         less zone (cell sizing) by changing the power output.

                      ■  Educate yourself as to the operation and security of wireless networks.
                      ■  Educate users about safe computing practices in the context of the use of
                         both wired and wireless networks.

                      ■  Perform a risk analysis of your network.
                      ■  Develop relevant and comprehensive security policies and implement
                         them throughout your network.























                                                                              www.syngress.com
   248   249   250   251   252   253   254   255   256   257   258