Chapter 17. Securing the Wireless Network

This chapter covers the following subjects:

Threats to Wireless Networks: Discusses threats to wireless networks.

Simple Authentications: Looks at basic wireless security.

Centralized Authentication: Shows how centralized authentication works using various EAP methods.

Authentication and Encryption: Describes WPA and WPA2.

It’s usually obvious that the medium of wireless networks can be more easily accessed from the outside than wired networks. This calls for a great deal of thought when you deploy a wireless network. What security do you need? What security measures can you perform? What are the security capabilities of your equipment? Should you authenticate users when they access the network? Should ...

Get CCNA Wireless Official Exam Certification Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.