April 2009
Intermediate to advanced
765 pages
19h 26m
English
IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:
802.11 security basics
Data privacy
Authentication, authorization, and accounting (AAA)
Segmentation
Monitoring and policy
Legacy 802.11 security
Legacy authentication
Static WEP encryption
MAC filters
SSID cloaking
Robust security
Robust security network (RSN)
Authentication and authorization
802.1X/EAP framework
EAP types
Dynamic encryption-key generation
4-Way Handshake
WPA/WPA2-Personal
TKIP encryption
CCMP encryption
Segmentation
VLANs
RBAC
Infrastructure security
Physical security
Interface security
VPN wireless security
Layer 3 VPNs

Numerous wireless security risks exist, and ...