Tuesday, August 27, 2019
Wireless security beyond 802.1x Essay Example | Topics and Well Written Essays - 500 words
Wireless security beyond 802.1x - Essay Example However, many consider the IPsec an improvement on the 802.1x. However, to ascertain the truth, we need to carry out an analysis of the protection provided by the different technologies. The 802.1x assists in controlling access to a computer network. The technology is a port-based access control method that is defined by the Institute of Electrical and Electronics Engineering which can be configured to require mandatory authentication between the network and the client. Communications become impossible without the authentication. Many people consider the 802.1x technology as the foundation of wireless security. However, deploying the 802.1x technology has its challenges. The technology requires devices that are compatible with 802.1x . The technology has weakness in its protocol, as it only authenticates at the establishment of a connection. Further connection does not require authentication, resulting in security risks (Al-Shaer, 2014). Additionally, the technology does not have centralized management capability. As such, the IPsec VPN became introduced. The Virtual Private Networks based on IPsec allow a layer of security to become a part of the wireless network, allowing for the protection of all traffic that flows in and out of the network. The method has several advantages over 802.1x including; Invisibility - Since the technology is based at the network level, it remains invisible in its operations (Snader, 2014). The end users do not have to learn its existence, nor do they have to interact directly with it, which is different from the 802.1x technology that requires authentication from clients. Lack of dependence on applications - The IPsec technology does not depend on applications to become effective, as the s=entire system is operated at the network level. As such, it avoids compatibility issues, which are common in 802.1x systems. Broken algorithms - A number of key algorithms used by the IPsec have been cracked,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.