O'Reilly logo

Cisco ISE for BYOD and Secure Unified Access by Aaron Woland, Jamey Heary

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 26. MACSec and NDAC

In years long passed, when WiFi was first being introduced into the consumer and corporate space, security concerns were raised. The concerns focused on sensitive data being transmitted through the air, without any level of confidentiality. The temporary answer to this was to use Wired Equivalency Protection (WEP). WEP was not very secure (as history has confirmed), but it provided an extra level of protection designed to bring wireless connections to the same security-level as a wired network.

Well, the fun part (for geeks like me) is that wireless networks quickly became even more secure than wired networks. As described many times in this book so far, 802.1X authentication took off like a rocket in wireless networks, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required