O'Reilly logo

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN by CCNA Lee Barken - CISSP MCP, CPA

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we reviewed some of the basic security features of the 802.11 protocol and how they can be applied in both large and small wireless environments. We also reviewed how the basic wireless authentication and association building blocks fall into place.

As you can see in this chapter, the 802.11 specification works very well in simple environments; however, scaling the network to large deployments is very difficult using native 802.11 tools. Using built-in security mechanisms such as disabling SSID broadcasts, enabling MAC filtering, and WEP are great for small deployments.

However, these solutions fall apart in large environments:

  • SSID broadcasts are needed to enable roaming between APs.

  • MAC filtering is not practical because ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required