Previous Section  < Day Day Up >  Next Section

4 Network security features present

Close ESSIDs

MAC filtering

explicit deny

  

explicit allow

Protocol filtering

     
      

filtered protocols

__________________________

WEP

         
  

key size

___

static or dynamic

___

  

key rotation frequency

___

TKIP implemented

___

  

other WEP enhancements

__________________________________

Authentication system

       

open

     

mixed

close

802.1x authentication

 

EAP type

__________________________

 

User database type

__________________________

 

802.1x-based WEP key rotation

rotation time ________

 

ESSID/MAC EAP authentication

    

Centralized authentication implemented

 

Kerberos v4

RADIUS

 
 

Kerberos v5

TACACS

 
        

TACACS version

___

 

Layer 3 VPN implemented

        
  

VPN type and mode ______________________________

 

key exchange

shared secret

 
  

asymmetric crypto

DH asymmetric crypto

 
  

X.509 certificates

other

 

ciphers used

     

symmetric

___

 
   

message digest

___

assymmetric

___

 

key/hash size

      

symmetric

___

 
   

message digest

___

assymmetric

___

 

tunneling implemented

IPSec AH

 
     

PPTP

IPSec ESP

 
     

L2F

L2TP

 
     

CIPE

GRE

 
     

IP-IP

VTP

 
     

DVS

ATMP

 
     

Other

___________________

MIN-IP-IP

 

Higher-layer security protocols used

SSHv1

  

S/MIME

SSHv2

  

SCP

HTTPS

  

Other

_________________

PGP/GNUPG

  

Wireless authentication gateway

______________________________

  

gateway type

______________________________

  

Proper wired/wireless network separation

  

Type of gateway/firewall

  

______________________________

  

Gateway malware filtering present

Gateway SPAM filtering present

  

Access points management from the wireless side is

enabled

  

restricted

disabled

  

Connections between wireless peers denied

  

Wireless peers have firewalling capability

  

Wireless IDS present

IDS type

________________

  

Remote sensors present

Sensor type

________________

  
       

Number of sensors ___

  

Centralized logging present

         
 

Logging is done over

 

UDP

TCP

   
 

Log review frequency

___

       
 

Wired IDS present

IDS type

_______________

   
 

Remote sensors present

Sensor type

_______________

   
        

Number of sensors

___

     

Honeypots deployed

          
  

wireless

wired

   
  

comments

_________________________________________

   


    Previous Section  < Day Day Up >  Next Section