Securing wireless networks
Items to consider when implementing a secured wireless implementation include:
- Client and access point authentication
- Wireless network encryption
A quick note on SSID cloaking and MAC filtering
It was once thought that simply hiding or cloaking the presence of the wireless network was sufficient to thwart attackers. And adding MAC address filtering to limit host access was considered a valid method to "authenticate" hosts. Both of these methods have proven to be ineffective to secure a wireless network implementation. Cloaking or attempting to hide an SSID is easily undermined by the inherent nature of wireless network communication design. When a host has already connected to a hidden network, the next time the wireless ...
Get Enterprise Security: A Data-Centric Approach to Securing the Enterprise now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.