Chapter 2 Legacy 802.11 Security

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

Authentication

Wired Equivalent Privacy (WEP) encryption

Temporal Key Integrity Protocol (TKIP) Encryption

Virtual Private Networks (VPNs)

MAC Filters

SSID Segmentation

SSID Cloaking

Many changes to the security mechanisms of the 802.11 standard have taken place since its ratification in 1997. Three pre-RSNA or legacy security mechanisms exist: Open System authentication, Shared Key authentication, and WEP encryption. These pre-RSNA security mechanisms ...

Get CWSP, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.