Chapter 8
Wired and Wireless LAN Security
In this chapter, you learn the following:
How to implement a zero trust architecture (ZTA) utilizing 802.1X on wired and wireless networks
How to implement Layer 3 and Layer 7 firewalling on Meraki MR access points (APs)
How to implement security features on Meraki MS switches such as port isolation, rogue DHCP server detection, and Secure Port
How to implement a security policy using group policies and adaptive policies with security group tags
Today’s IT security standards, including NIST 800-207, call for a shift away from simply building networks to building secure networks. This move has been in the making for many years with remote access; however, it is now at the forefront with the prevalence ...
Get Securing Enterprise Networks with Cisco Meraki now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.