MikroTik Certified Internetworking Engineer (MTCINE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
1-5 Network Topologies
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 IP Addressing and Subnetting
3-1 IPv4 Addressing
3-2 Subnetting
3-3 IPv6 Addressing
3-4 IPv6 Subnetting
3-5 NAT and PAT
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF
4-4 BGP
4-5 EIGRP
5 Wireless Networking
5-1 Wireless Basics
5-2 Wireless Security
5-3 Wireless Configuration
5-4 Wireless Bridging
5-5 Wireless Repeaters
6 VPN Technologies
6-1 VPN Basics
6-2 IPsec VPN
6-3 OpenVPN
6-4 L2TPPPTP
6-5 SSL VPN
7 Quality of Service (QoS)
7-1 QoS Basics
7-2 Traffic Shaping
7-3 Policing
7-4 Prioritization
7-5 Queue Types
8 Firewall and Security
8-1 Firewall Basics
8-2 Firewall Rules
8-3 NAT Rules
8-4 Filtering Rules
8-5 Hotspot and Captive Portal
9 Advanced Topics
9-1 VLANs
9-2 MPLS
9-3 High Availability
9-4 Load Balancing
9-5 Monitoring and Troubleshooting
5.2 Wireless Security Explained

5.2 Wireless Security Explained

Key Concepts in Wireless Security

1. Encryption Protocols

Encryption protocols are essential for securing wireless communications. They convert data into a coded format that can only be read by someone who has the decryption key. Common encryption protocols include WEP, WPA, WPA2, and WPA3. WPA3 is the most recent and secure standard, offering advanced protection against various attacks.

Example: Think of encryption as a locked diary. Only someone with the key (decryption key) can read the contents. Similarly, encrypted wireless data can only be read by devices with the correct decryption key.

2. Authentication Methods

Authentication methods ensure that only authorized users can access the wireless network. Common methods include Pre-Shared Key (PSK), Extensible Authentication Protocol (EAP), and 802.1X. EAP is often used in enterprise environments and supports various authentication methods like EAP-TLS, EAP-TTLS, and PEAP.

Example: Consider authentication as a door with a keycard system. Only individuals with valid keycards (authentication credentials) can enter the room. Similarly, only devices with valid credentials can access the wireless network.

3. Access Control

Access control involves managing who can connect to the wireless network and what resources they can access. This can be achieved through MAC address filtering, which allows only devices with specific MAC addresses to connect, or through more advanced solutions like RADIUS servers.

Example: Think of access control as a gated community. Only residents with the correct ID (MAC address) can enter. Similarly, only devices with the correct MAC address or authentication credentials can connect to the wireless network.

4. Network Segmentation

Network segmentation involves dividing the wireless network into smaller, isolated segments. This limits the potential impact of a security breach by containing it to a specific segment. Techniques like VLANs (Virtual LANs) and separate SSIDs for different user groups can be used to achieve segmentation.

Example: Imagine a large office building with multiple departments. Each department has its own secure area (segment). If one area is compromised, the others remain secure. Similarly, network segmentation ensures that a breach in one segment does not affect the entire network.

5. Regular Security Audits

Regular security audits are crucial for identifying and addressing vulnerabilities in the wireless network. Audits can include penetration testing, vulnerability scanning, and compliance checks. Regular audits help ensure that the network remains secure against evolving threats.

Example: Think of security audits as regular health check-ups. Just as a doctor checks for potential health issues, security audits check for potential vulnerabilities. Regular check-ups ensure that any issues are identified and addressed promptly.