<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WEP security design options? in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/wep-security-design-options/m-p/300436#M22741</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, some things to keep in mind:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With static WEP, you cannot guarantee that your transmissions are private. Possible HIPAA issues if patient data is part of the conversation? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also cannot guarantee that all transmissions are from authorized users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there's any way to put a VPN client on your devices, that might not be a bad idea. If that's out of the question, all you can do is minimize the possible risks by setting up strict firewall rules that block all traffic from your WEP vlan(s) except to the specific servers and specific ports that need to be accessible, and then make sure that your servers are fully patched and configured to be as secure as possible as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Aug 2004 17:30:48 GMT</pubDate>
    <dc:creator>gamccall</dc:creator>
    <dc:date>2004-08-30T17:30:48Z</dc:date>
    <item>
      <title>WEP security design options?</title>
      <link>https://community.cisco.com/t5/wireless/wep-security-design-options/m-p/300435#M22740</link>
      <description>&lt;P&gt;Our wireless network consists of approx 250 AP1200's connected to closet 3500's or 3550's trunked to core 6500's. We use several vlans and ssid's for different applications. All use LEAP and Cisco Secure authentication.&lt;/P&gt;&lt;P&gt;We have been asked to add 400-600 medical devices that support only WEP. These devices must be able to access a server and workstations on several local subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Given the limited security of WEP, please recommend all design considerations that would make this reasonably secure.&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 16:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wep-security-design-options/m-p/300435#M22740</guid>
      <dc:creator>thessick</dc:creator>
      <dc:date>2021-07-04T16:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: WEP security design options?</title>
      <link>https://community.cisco.com/t5/wireless/wep-security-design-options/m-p/300436#M22741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, some things to keep in mind:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With static WEP, you cannot guarantee that your transmissions are private. Possible HIPAA issues if patient data is part of the conversation? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also cannot guarantee that all transmissions are from authorized users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there's any way to put a VPN client on your devices, that might not be a bad idea. If that's out of the question, all you can do is minimize the possible risks by setting up strict firewall rules that block all traffic from your WEP vlan(s) except to the specific servers and specific ports that need to be accessible, and then make sure that your servers are fully patched and configured to be as secure as possible as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2004 17:30:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wep-security-design-options/m-p/300436#M22741</guid>
      <dc:creator>gamccall</dc:creator>
      <dc:date>2004-08-30T17:30:48Z</dc:date>
    </item>
  </channel>
</rss>

