O'Reilly logo

CCNA Wireless (640-722 IUWNE) Quick Reference by Jerome Henry

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Implement Basic WLAN Security

Eavesdropping on a wired Ethernet infrastructure implies physical access to a switch port. Eavesdropping on a wireless network simply requires being able to receive an access point signal, which may reach hundreds of meters away from the AP physical location. For this reason, security is a key concern for any wireless network.

Authentication and Encryption Concepts

Authentication is a process of finding out whether something is exactly what it appears to be. In wireless networks, authentication is used to prove the identity of the person or device trying to gain access and make sure that only the appropriate user accesses the applicable network. Authentication can be used to identify the machine connecting ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required