4) User Seperation: Different groups of users
should apply the different security policy. For
example, Guest users are only allowed to access
330
the Internet with limited services while Staff users
are allowed to access the Intranet. User Separation
can be done by different SSIDs and different
VLANs.
5) Authentication: The wireless system should
implement some forms of authentication in order
to control users before allowed to access the
network. Mutual authentication (i.e., user
authenticates the wireless system and wireless
system authenticates the users) is necessary for the
wireless network. Mutual authenticaltion can
mitigate the rogue access point. Users will only
associate to the trusted access point. EAP-TLS,
EAP-TTLS, PEAP are most common
authentication protocol.
6) Confidentiality: the encyption will provide the
secure communication over the wireless LAN.
WPA or IEEE 802.11i is the common solution.
7) Physical Security: To secure the physical access
is important. All network equipments (such as
server, access point and switches) should be
securely protected from the unauthorized access.
LAN outlet should also be secure.
8) Awareness Training and Education: the
employees are required to have the awareness
training regularly.