SHARE
Facebook X Pinterest WhatsApp

Guide to Securing Legacy IEEE 802.11 Wireless Networks

Guide to Securing Legacy IEEE 802.11 Wireless Networks Wi-Fi has been in the enterprise for more than a decade now, but security on older wireless hardware has been lacking. This guide will help you map a migration to greatly enhanced IEEE 802.11i-based security. Wireless local area networks (WLAN) are groups of wireless networking nodes within […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Nov 24, 2010

Guide to Securing Legacy IEEE 802.11 Wireless Networks

Wi-Fi has been in the enterprise for more than a decade now, but security on older wireless hardware has been lacking. This guide will help you map a migration to greatly enhanced IEEE 802.11i-based security.


Wireless local area networks (WLAN) are groups of wireless networking nodes within a
limited geographic area, such as an office building or building campus, that are
capable of radio communication. WLANs are usually implemented as extensions to existing
wired local area networks (LAN) to provide enhanced user mobility and network access.
The most widely implemented WLAN technologies are based on the IEEE 802.11 standard and
its amendments. This document discusses the security of legacy IEEE 802.11 technologies
— those that are not capable of using the IEEE 802.11i security
standard.

Organizations employing legacy IEEE 802.11 WLANs should be aware of the limited and
weak security controls available to protect communications. Legacy WLANs are
particularly susceptible to loss of confidentiality, integrity and availability.
Unauthorized users have access to well-documented security flaws and exploits that can
easily compromise an organization’s systems and information, corrupt the organization’s
data, consume network bandwidth, degrade network performance, launch attacks that
prevent authorized users from accessing the network or use the organization’s resources
to launch attacks on other networks.

The National Institute of Standards and Technology (NIST) recommends that
organizations with existing legacy IEEE 802.11 implementations develop and implement
migration strategies to move to IEEE 802.11i-based security because of its superior
capabilities. IEEE 802.11i addresses the security flaws in the original IEEE 802.11
standard with built-in features providing robust wireless communications security,
including support for Federal Information Processing Standard (FIPS) validated
cryptographic algorithms. While legacy IEEE 802.11 networks are still in use,
organizations should follow the recommendations in this publication to compensate for
the security weaknesses inherent in legacy WLANs.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.doc

  • Guide to Securing Legacy IEEE 802.11 Wireless Networks.pdf

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.