||Wireless LAN Security: A Short History|
|Subject:||Secure wireless gateways.|
"Community networks  may be deployed to give away Internet access to the masses, and securing the network from end-user access is not a goal."
That's not always true. Some community networks, like Personal Telco Project, allow open access to their hotspots, but want a "splash page" on access to notify users of whose network they're on. Others take a co-op based approach, where users who contribute substantially to the community network are given a higher class of access, and, in these cases, a login is required, even if access to the network is otherwise free.
The only major caveat of using a secure wireless gateway is that it only secures access to outside resources, like Internet or internal network access, not the actual wireless connections themselves. For ordinary web browsing, this should not be an issue at all. For sensitive transactions, such as downloading e-mail or engaging in online commerce, end-to-end encryption such as SSL should already be in use, rendering special encryption of the wireless connection itself unnecessary. Most commercial hotspot networks, such as Sputnik, as well as most hotels and airports, are already using this approach with great success.
In summary, you don't have to wait for the IEEE to sort out all of the details of 802.1x et al., and then wait for vendors to start implementing these standards, before securing your wireless network. You can build a secure WLAN today using Open Source tools and off-the-shelf technology. Secure wireless gateways are and will continue to be a reliable and functional option for securing wireless networks today, right now, not months or years down the road.
Hear us Roar