Managing Your Wireless Security Policy
These products can help you manage your policy. You can set a trap for unencrypted traffic should you have a policy that requires encrypted wireless traffic. Or you can look for rogue or unauthorized access points. Other products that can help you manage your wireless policy include:
AirDefense (www.airdefense.net/products/features/policy.html):
Monitor and enforce configuration policies, WLAN device and roaming policies, performance policies, channel policies, and vendor policies.
AirWave Management Platform (www.airwave.com):
Automatic configuration, policy push, and compliance auditing.
Chantry BeaconWorks (www.chantrynetworks.com):
Allows central management of APs.
Cirond Winc Manager (www.cirond.com):
WEP key distribution, location-based access control, provisioning system, and real-time mapping.
Computer Associates Unicenter Wireless Site Management (www.ca.com):
Key management, wireless rogue AP detection, provisioning, network discovery and mapping, and WAP configuration and administration.
Enterasys Secure Networks (www.enterasys.com/solutions):
Provisioning and security solutions.
Sygate (www.sygate.com/products/enterprise_policy_management.htm):
Definition of policies based on client behavior.
Vernier System 6500 (www.verniernetworks.com/products/control.htm):
Hardware enterprise-class WLAN gateway solution that provides network administrators with the flexibility of configuring access rights based on user, group, time, and location (centralized policies).
Wavelink Mobile Manager (www.wavelink.com):
WEP key management, enterprise ACLs, and policy push.
In this tutorial:
- Designing a Secure Network
- Security as Cost of Doing Business
- Developing a Security Architecture
- Developing a Wireless Security Policy
- Developing Wireless Security Standards
- Developing Wireless Security Best Practice
- Managing Your Wireless Security Policy
- Designing a Secure Network
- Performing a Risk Analysis