We concluded that the security of Wireless LAN in many
places still used default setting which vulnerable to
attack. They still use WPA2 PSK and there is no
separation for internal and external users. WPA2 PSK
does have weaknesses that can be exploited easily using a
single laptop and Backtrack Linux operating system with
only 4 steps. The test results show that the attack on
security WLAN that used WPA2 PSK technique can be
cracked easily in less than 9 minutes.
WPA2 Enterprise is used in our experiment use
protection based PEAP MS-CHAP v2. PEAP MS-CHAP
v2 provides mutual protection on the server and client
using a digital certificate and additional protection with
the username / password for each user in the Active
Directory database backend.
Captive Portal Firewalls are used to prevent visitors
connect to the internal network. it is blocked by the
firewall. When the external user wants to use the Internet,
will appear portal with the username and password. So
even though visitor can be connected to the internet, but
cannot go into internal network.