Close ESSIDs  |  
  | 
MAC filtering  |  
  | explicit deny  |  
  | 
|   |   | explicit allow  |  
  | 
Protocol filtering  |  
  |   |   |   |   |   | 
|   |   |   |   |   |   | filtered protocols  | __________________________  | 
WEP  |   |   |   |   |   |   |   |   |   | 
|   |   | key size  | ___  | static or dynamic  | ___  | 
|   |   | key rotation frequency  | ___  | TKIP implemented  | ___  | 
|   |   | other WEP enhancements  | __________________________________  | 
Authentication system  |   |   |   |   |   |   |   | open  |  
  | 
|   |   |   |   |   | mixed  |  
  | close  |  
  | 
802.1x authentication  | 
|   | EAP type  | __________________________  | 
|   | User database type  | __________________________  | 
|   | 802.1x-based WEP key rotation  |  
  | rotation time ________  | 
|   | ESSID/MAC EAP authentication  |  
  |   |   |   |   | 
Centralized authentication implemented  | 
|   | Kerberos v4  |  
  | RADIUS  |  
  |   | 
|   | Kerberos v5  |  
  | TACACS  |  
  |   | 
|   |   |   |   |   |   |   |   | TACACS version  | ___  |   | 
Layer 3 VPN implemented  |  
  |   |   |   |   |   |   |   |   | 
|   |   | VPN type and mode ______________________________  |   | 
key exchange  | shared secret  |  
  |   | 
|   |   | asymmetric crypto  |  
  | DH asymmetric crypto  |  
  |   | 
|   |   | X.509 certificates  |  
  | other  |  
  |   | 
ciphers used  |   |   |   |   |   | symmetric  | ___  |   | 
|   |   |   | message digest  | ___  | assymmetric  | ___  |   | 
key/hash size  |   |   |   |   |   |   | symmetric  | ___  |   | 
|   |   |   | message digest  | ___  | assymmetric  | ___  |   | 
tunneling implemented  | IPSec AH  |  
  |   | 
|   |   |   |   |   | PPTP  |  
  | IPSec ESP  |  
  |   | 
|   |   |   |   |   | L2F  |  
  | L2TP  |  
  |   | 
|   |   |   |   |   | CIPE  |  
  | GRE  |  
  |   | 
|   |   |   |   |   | IP-IP  |  
  | VTP  |  
  |   | 
|   |   |   |   |   | DVS  |  
  | ATMP  |  
  |   | 
|   |   |   |   |   | Other  | ___________________  | MIN-IP-IP  |  
  |   | 
Higher-layer security protocols used  | SSHv1  |  
  |   |   | 
S/MIME  |  
  | SSHv2  |  
  |   |   | 
SCP  |  
  | HTTPS  |  
  |   |   | 
Other  | _________________  | PGP/GNUPG  |  
  |   |   | 
Wireless authentication gateway  | ______________________________  |   |   | 
gateway type  | ______________________________  |   |   | 
Proper wired/wireless network separation  |   |   | 
Type of gateway/firewall  |   |   | ______________________________  |   |   | 
Gateway malware filtering present  |  
  | Gateway SPAM filtering present  |  
  |   |   | 
Access points management from the wireless side is  | enabled  |  
  |   |   | 
restricted  |  
  | disabled  |  
  |   |   | 
Connections between wireless peers denied  |  
  |   |   | 
Wireless peers have firewalling capability  |  
  |   |   | 
Wireless IDS present  |  
  | IDS type  | ________________  |   |   | 
Remote sensors present  |  
  | Sensor type  | ________________  |   |   | 
|   |   |   |   |   |   |   | Number of sensors ___  |   |   | 
Centralized logging present  |  
  |   |   |   |   |   |   |   |   |   | 
|   | Logging is done over  |   | UDP  |  
  | TCP  |  
  |   |   |   | 
|   | Log review frequency  | ___  |   |   |   |   |   |   |   | 
|   | Wired IDS present  |  
  | IDS type  | _______________  |   |   |   | 
|   | Remote sensors present  |  
  | Sensor type  | _______________  |   |   |   | 
|   |   |   |   |   |   |   |   | Number of sensors  | ___  |   |   |   |   |   | 
Honeypots deployed  |  
  |   |   |   |   |   |   |   |   |   |   | 
|   |   | wireless  |  
  | wired  |  
  |   |   |   | 
|   |   | comments  | _________________________________________  |   |   |   |