Setting Up Enterprise Wireless Security


Home > Setting Up Wireless Security > Setting Up Enterprise Wireless Security

Setting Up Wireless Security for Large Enterprises

Overview

Enterprise security is different from home user security in that an authentication server is used, and encryption keys are dynamically changed, making it more difficult for unauthorized users to access and read data on the network.

To make your wireless connection more secure, apply the strongest security settings supported by the AP or wireless router to which you are connected. For large enterprise networks, CCKM, 802.1X, WPA, and WPA2 are common security methods, and WAPI-CA is a possible alternative.

Supported Security Methods

The following table shows the enterprise security methods supported by the Mediatek Utility.

Security Protocol Encryption Method Comments
WPA
(Wi-Fi Protected Access)

WPA2
(Wi-Fi Protected Access 2)

TKIP(MFP)*
(Temporal Key Integrity Protocol (Management Frame Protection))

AES(MFP)*
(Advanced Encryption Standard (Management Frame Protection))

AES
(Advanced Encryption Standard)

TKIP
(Temporal Key Integrity Protocol)

WPA and WPA2 are designed for large enterprises. They both require an authentication server.

WPA2 is a faster, more recent standard than WPA.

AES is a stronger, more recent standard than TKIP.

MFP (management frame protection) offers more security than no MFP.

CCKM
(Cisco Centralized Key Management)

(not supported by Windows XP)

WEP (Wireless Encrypted Privacy)

AES

TKIP

CCKM allows roaming between APs with WDS (wireless domain services) enabled and access to the same RADIUS server.
802.1X WEP 802.1X is designed for large enterprises and requires an authentication server. WEP is an older standard and is easily decrypted.

* Management frame protection (MFP) available for WPA2 only.

Note: The Utility also supports WAPI-CA authentication with SMS4 encryption, but at the time of writing, it is a new Chinese standard and has yet to be made an ISO standard.

Supported Authentication and Tunnel Methods

Enterprise security typically comprises an authentication method to ensure clients have authorization to access the network, and a tunnel method to encrypt data transmitted on the network. The following table describes the authentication and tunnel methods supported by the Mediatek Utility.

Authentication Method Tunnel Authentication Method Comments
TLS/Smart Card n/a Mutual authentication of client and server using client and server-side certificates make TLS (Transport Layer Security) very secure but also complex. Widely implemented.

PEAP

EAP-TLS/Smart Card
 
EAP-MS-CHAP v2
 
Generic Token Card  

PEAP (Protect Extensible Authentication Protocol) uses server-side certificates for less complex support requirements than TLS, while still providing strong security. All PEAP methods described, and particularly PEAP-EAP-MS-CHAP v2 (commonly known as PEAP) are widely implemented.

TTLS

MS-CHAP v2

MS-CHAP

CHAP

PAP

EAP-MD5

TTLS (Tunneled Transport Layer Security) provides mutual authentication of client and server through an encrypted channel using server-side certificates. It has less complex support requirements than TLS, while still providing strong security. Often used in combination with a traditional network server without EAP capability. Less widely implemented.

Note: PAP and MD5 are not secure methods. MS-CHAP v2 is more secure than other authentication methods listed.

FAST

TLS/Smart Card

Generic Token Card

EAP-MS-CHAP v2

FAST (Flexible Authentication via Secure Tunneling) uses PAC (Protected Access Credential) instead of certificates for mutual authentication of client and server. PACs, like certificates, can be manually installed or distributed by the server. Suitable for large enterprises as investment in Cisco infrastructure is required.
MD5-Challenge n/a No server authentication. MD5 is easily decrypted. Not widely implemented.
LEAP

n/a

LEAP (Light Extensible Authentication Protocol) provides mutual authentication of server and client and offers dynamic WEP key based encryption. However, it requires strong passwords for strong security. Suitable for large enterprises as investment in Cisco infrastructure is required.
WAI WPI Part of the WAPI-CA protocol, as yet unagreed upon level of security and not widely implemented outside China.

Instructions

Follow these instructions to set up WPA/WPA2, 802.1X, or WAPI-CA wireless security on the Mediatek Adapter.

  1. Click the Profile Settings button to display the Profile List screen.

  2. To configure a wireless security profile, click the Add button to add a new profile, or click the Edit button to edit an existing profile.

  3. In the screen that appears, enter the following settings.
  4. In the Profile Settings screen, click the right arrow to save your settings. For instructions on setting up a security method, click on the corresponding link.

  5. After you have set up security settings, a profile configured with your security settings appears in the Profile screen. To edit settings, click the Edit button , or to delete settings, click the delete button .

Troubleshooting

See Troubleshooting for suggestions on solving problems connecting to a wireless network.

For further information on the screens used in this procedure, see the Profile Settings screens.