O'Reilly logo

802.11 Security by Bruce Potter, Bob Fleck

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Part III. Access Point Security

A wireless access point can come in many shapes and sizes. There are commodity access points that can be purchased at your local computer store for around a hundred dollars. There are also industrial-quality access points sold by companies like Cisco Systems for thousands of dollars. Alternatively, through the hard work of open source developers, you can turn a Linux, FreeBSD, or OpenBSD host into an access point. Regardless of the type of access points you use, securing them is critical to the security of your entire network infrastructure. By using encryption, authentication, and proper monitoring, your access points will facilitate secure wireless communication.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required