O'Reilly logo

CWNA®: Certified Wireless Network Administrator Official Study Guide by David A. Westcott, David D. Coleman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Network Security Architecture

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • 802.11 security basics

    • Data privacy

    • Authentication, authorization, and accounting (AAA)

    • Segmentation

    • Monitoring and policy

  • Legacy 802.11 security

    • Legacy authentication

    • Static WEP encryption

    • MAC filters

    • SSID cloaking

  • Robust security

    • Robust security network (RSN)

    • Authentication and authorization

    • 802.1X/EAP framework

    • EAP types

    • Dynamic encryption-key generation

    • 4-Way Handshake

    • WPA/WPA2-Personal

    • TKIP encryption

    • CCMP encryption

  • Segmentation

    • VLANs

    • RBAC

  • Infrastructure security

    • Physical security

    • Interface security

  • VPN wireless security

    • Layer 3 VPNs

Network Security Architecture

Numerous wireless security risks exist, and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required