S 2.385 Selection of suitable WLAN components

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator, Head of IT, IT Security Officer

When selecting WLAN devices, it must first be examined whether the devices fit the WLAN security strategy. There are numerous types and device classes of WLAN components. They not only differ in terms of the features they offer, but also in terms of their security mechanisms and ease of use. In addition, they place different requirements on hardware and software components in the operational environment.

Due to the numerous different types of WLAN components, compatibility problems can be expected. The most important criteria for the selection of WLAN components are therefore security and compatibility.

If it has been decided to build a WLAN in an organisation, then a list of requirements should be created which is used to evaluate the products available on the market. The products to be purchased should then be selected based on the evaluation. Based on various requirements for use, it has been shown in practical applications that it may be perfectly sensible to select several types of devices for purchase. The variety of devices should be limited, though, to simplify support. An important criterion when purchasing WLAN components is their compatibility with existing devices.

When purchasing the devices, the data throughput and range should also be considered. Using external antennas, the range of WLAN components can be improved. However, it must be ensured in this case that the increased range does not cause the emissions to radiate into areas in which the WLAN is not intended to be used and should not be used.

When purchasing access points, the following should be checked, among other items,

It absolutely must be tested whether the cryptographic methods implemented not only have the same designation as the methods used by the other WLAN components, but also work together correctly.

The correct configuration of the access points is an essential aspect of security. On some access points, wireless configuration directly over the WLAN is possible, which is usually touted by the manufacturers as being convenient. However, such functionality also poses security problems and should therefore not be used. If it is available, it should at least be possible to switch it off (and it should be switched off at all times during operation). Many access points also offer the ability to connect over a serial or USB interface to a management console to enable easy configuration. The management console can then be administered via HTTP or Telnet over the Intranet or Internet. In this case, the remote access must be reasonably secured, for example by securing the communication with SSL or SSH. Remote access over the Internet should generally be examined critically.

Access to the WLAN components for administration purposes should only be possible by authorised persons. For this reason, it should be examined how this access is secured. If access is secured via passwords, then the passwords selected should be as complex as possible (see S 2.11 Provisions governing the use of passwords). It is better, though, to use strong authentication methods for administration accesses (see also S 4.133 Appropriate choice of authentication mechanisms).

Implementation of the necessary security rules on access points is often very complicated. In addition to key management, this includes the necessary settings for the various parameters and options. There are now solutions available for some access points to control them in an organisation over a central server. Unfortunately, only proprietary solutions have been available so far, and they only support the WLAN components of the particular manufacturer.

Since it can take a lot of time and effort until the network administrator has determined the correct configuration, especially for network coupling elements, it should be possible to save the configuration.

The language used in the online help system and documentation of the WLAN components should be formulated so that future users and administrators will be able to understand the technical descriptions.

Interoperation with the corresponding infrastructure

When purchasing, all WLAN components should be checked to determine if they operate correctly with the corresponding infrastructure. This includes checking the following, for example:

When purchasing a larger WLAN installation, the corresponding tests must be performed before actually purchasing. The degree of fulfilment of the technical requirements can be evaluated with the help of a test catalogue. These tests make it easier later on to actually install the WLAN and obtain approval.

Review questions: