AirMagnet Laptop Wireless LAN Policy Reference Guide
Table of Contents iii
Rogue AP by Channel.......................................................................... 91
Rogue AP by IEEE ID (OUI)............................................................... 92
Rogue AP by MAC Address (ACL) .................................................... 93
Rogue AP by SSID............................................................................... 94
Rogue AP by Wireless Media Type..................................................... 95
Rogue AP Traced on Enterprise Wired Network................................. 96
Rogue Station ..................................................................................................... 97
Rogue Station by Channel.................................................................... 97
Rogue Station by IEEE ID (OUI) ........................................................ 98
Rogue Station by MAC Address (ACL).............................................. 99
Rogue Station by SSID ...................................................................... 100
Rogue Station by Wireless Media Type............................................. 101
Chapter 5: Authentication and Encryption.............................103
Other Encryption and Authentication Methods................................................ 104
Device Unprotected by Other Encryption.......................................... 104
Device Unprotected by Fortress Encryption...................................... 105
Static WEP Encryption..................................................................................... 106
AP with Encryption Disabled............................................................. 107
Client with Encryption Disabled........................................................ 107
Crackable WEP IV Key Used............................................................ 108
Device Using Open Authentication.................................................... 109
Device Using Shared Key Authentication ......................................... 109
WEP IV Key Reused.......................................................................... 111
VPN .................................................................................................................. 111
Device Unprotected by VPN.............................................................. 112
WPA and 802.11i.............................................................................................. 113
802.11x Rekey Timeout Too Long.................................................... 114
802.1x Unencrypted Broadcast or Multicast...................................... 114
Device Unprotected by IEEE 802.11i/AES ....................................... 116
Device Unprotected by 802.11x......................................................... 120
Device Unproetected by EAP-FAST ................................................. 122
Device Unprotected by PEAP............................................................ 123
Device Unprotected by TKIP............................................................. 124
WPA or 802.11i Pre-Shared Key Used.............................................. 126
Laptop Wireless LAN Policy Reference Guide.book Page iii Thursday, January 25, 2007 5:36 PM