First page Back Continue Last page Overview Graphics
Securing WEP
Use WEP only if nothing else better is available
Use 128 bit encryption
Test all access points for weak packets (Kismet)
Consider changing shared access keys periodically or when security situation changes
Use with MAC controls on small networks
Keep access points behind a firewall in a DMZ
Assume the network is untrusted and provide for additional security