Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Give some examples of how you would automate your wireless security architecture

ID: 3847270 • Letter: G

Question

Give some examples of how you would automate your wireless security architecture. For instance, what policies would you develop for wireless access how could those policies be automatically enforced. What profiles might you develop? What provisions should you consider? Also, would you implement controls, safeguards, and countermeasures at the Wireless AP level or the Wireless Controller or both?

What is a PAC file? And what does if have to do with EAP Chaining? Moreover how does EAP-TEAP affect the latter?

Explanation / Answer

First of all, you need to consider where you are deploying Wi-Fi. If it is for enterprise then you need to have the following in place to be sure that Wi-Fi is secure:

1. Encryption should be WPA-Enterprise which includes AD authentication and iff AD (Active Directory) is not there, then please use LDAP server to authenticate.
2. There should be minimum 2 wireless IP segments. One is for internal users and the 2nd one is for guest.
3. In AD, there should be one group for all the users who are eligible to connect to internal Wi-Fi. That group will be there in WLC (Wireless Controller) configuration to make it available all the time.
4. All the accesses should be based on username/password because that's the best security you can have right now. So your safeguards and controls can be achieved by those.
5. For countermeasures, you need to have one proxy server (any proxy like Mcafee or Bluecoat or the free one like squid) and the configuration for that (PAC file or Proxy Auto-Config) will be applied to the PC which tries to connect to Wi-Fi.

These above 5 points are the profile you can have (in overview) and based on your requirements, you can always shape the configuration and countermeasures.

PAC file is nothing but a proxy auto-config file which provides the configuration of proxy and will be applied to the browser if you are trying to access the Internet. This is an auto-config, so if you move from one location to other, the configuration will automatically be changed.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote