Protecting Communications
When data is transmitted between the 802.1x client and the WAP or switch, the data is subject to inspection attacks. The methods used to protect this transmitted data differ between wireless and wired networks.
Protecting Wireless Communications
When you implement a wireless network, you must develop a plan for securing the network to reduce the likelihood of the threats mentioned in the previous section. Some of the more common methods of protecting a wireless network are mentioned in the sections that follow.
MAC Filtering
One of the most basic ways of protecting a wireless network is to implement MAC filtering. At the WAP, you can configure which MAC addresses (the low-level firmware address of a wireless card) ...
Get Microsoft® Windows® Security Resource Kit, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.