Wireless network implementation management security

The Cisco Unified Wireless Network features a comprehensive architecture of security tools and technologies to secure the WLAN environment, clients, and infrastructure, which are summarized in Chapter 4, "Cisco Unified Wireless Network Architecture— Base Security Features" of the Wireless and Network Security Integration Design Guide. In a comprehensive, network-wide layered security solution, the Cisco Unified Wireless Network plays an important role in securing wireless access, but there are opportunities to create a superset of layered network security via collaboration with the network infrastructure.

A wireless network is only one of the attack vectors against a network. While a WLAN network must be secure and able to protect itself from attack, a network-wide security solution that only addresses WLAN-related attacks is dangerously unbalanced. Mobile network clients need to be protected on all interfaces at all locations, enterprise networks need to be protected on all their perimeters, and monitoring and anomaly detection are required regardless of the source of network traffic. Ideally the same sets of tools and interfaces should be used to provide these baseline security functions as it reduces operational costs, reduces the risk of misconfiguration, and avoids the creation of a unbalanced security architecture that can be simply bypassed.

illustrates the role of the Cisco Unified Wireless Network security and the roles of other components in a network security architecture. The Cisco Unified Wireless Network provides solutions and WLAN standards-based proactive and operational security, and components such as Cisco Security Agent (CSA), Cisco Network Access Control (NAC) Appliance, Cisco Intrusion Prevention System (IPS), Cisco Security Monitoring, Analysis and Response System (CS-MARS), and Cisco firewalls build on this to provide an overall network security architecture. This provides a layered security system where the Cisco Unified Wireless Network provides security particular to the access layer technology and integration into the overall network security system.

Table 1 WLAN Security Elements and General Network Security Elements

Proactive Security

WLAN Specific Elements

General Network Security Elements

Harden the network infrastructure

Cisco Unified Wireless Network, LWAPP, Management Frame Protection, 802.1X

Infrastructure Hardening

Protect the endpoints

Wi-Fi Protected Access/Wi-Fi Protected Access2

CSA and Cisco Secure Services Client

Identify and enforce policy on users

Wi-Fi Protected Access/Wi-Fi Protected Access2, Client Exclusion on the Wireless LAN Controller

CSA, Cisco Secure Services Client, NAC, and Cisco Firewall

Secure communication

Access control

Access Control Lists on Wireless LAN Controller

Cisco Firewall

Operational Security

Monitor the network

Wireless LAN Controller, Wireless Control System, Adaptive wireless IPS

You might also like

Lessons from China  — The Hindu
Transferring the project appraisal function and the erstwhile Planning Commission staff to line ministries would be good moves. ..

Modi's Japan visit 2014: PM has lifted Japanese mood for business with India ..  — Economic Times
He promised to broad-base the kind of welcoming environment that Japanese investors have found in Gujarat and announced the setting up of a "Japan Plus Management Team" in the PMO. He also proposed that Japanese ..

State continues suicide prevention efforts  — The Sheridan Press
In July, the WDH released an updated “Preventing Suicide in Wyoming” plan, which was unveiled publically last week at the Wyoming Suicide Prevention Summit in Casper and will be implemented statewide over the next two years. .. Dr.

Operations and IT Graduate Trainee  — TARGETjobs
For the business to continue to grow and develop in a scalable way, the right processes, systems and technologies need to be in place – Operations and IT drives their improvement, development and implementation. Operations and IT strives to ..


How is wireless networks implemented?

Welll it depends on what sort of network you want to setup a home network or SOHO but which ever you setup you have to implement basic things like security, channel band and SSID