Audit Logging

Your work as a security administrator is not over once the gateway is deployed and firewall rules are configured. A machine or network can be compromised at any time. You must be diligent in monitoring and upgrading your gateway to make sure it remains intact. The chapters that follow provide specific examples of auditing mechanisms you can use on your gateway. These examples are by no means the only options available to you for auditing and monitoring. There are many tools, free or otherwise, available to keep track of your gateway. Examine your needs, examine your options, and deploy what works for you. Regardless of what tools you use, be sure to use something. Complacency in monitoring your gateway will lead to a compromise down the road.

Deploying a gateway can be difficult. Configuration can be a complicated process, and understanding all the options presented to you can be dizzying. Try to keep your eye on the goal: keeping your network and services secure from attackers. If you find you are getting tired or confused, take a break and step back from the project. Your gateway is the keystone of your security architecture. Deploy it with all of the diligence it deserves.

Get 802.11 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.