Chapter 1. Regulatory and Organizational Security Compliance

Failure to secure a WLAN makes it vulnerable to attacks. To properly secure your network, you must be able to identify common threats to wireless and know how to counteract them. You also need to secure your network access (management users, regular users, guests).

Identifying Wireless Vulnerabilities

Wireless vulnerabilities are grouped in four categories: Rogues (rogue access points (AP) [including hacker APs, evil twins, and honeypots], rogue clients, ad hoc clients, denial-of-service (DoS) attacks and other over-the-air attacks (including network reconnaissance, eavesdropping, and traffic cracking), guest network control, and legitimate user network control (making sure that each ...

Get CCNP Wireless (642-737 IAUWS) Quick Reference now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.