In this chapter, we reviewed some of the basic security features of the 802.11 protocol and how they can be applied in both large and small wireless environments. We also reviewed how the basic wireless authentication and association building blocks fall into place.
As you can see in this chapter, the 802.11 specification works very well in simple environments; however, scaling the network to large deployments is very difficult using native 802.11 tools. Using built-in security mechanisms such as disabling SSID broadcasts, enabling MAC filtering, and WEP are great for small deployments.
However, these solutions fall apart in large environments:
SSID broadcasts are needed to enable roaming between APs.
MAC filtering is not practical because ...