O'Reilly logo

Windows Server® 2008 PKI and Certificate Security by Brian Komar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Protecting Wireless Communications

When you implement a wireless network, you must develop a plan for securing the network to reduce the likelihood of the threats mentioned in the previous section. Some of the more common methods of protecting a wireless network are mentioned in the sections that follow.

MAC Filtering

One of the most basic ways of protecting a wireless network is to implement media access control (MAC) filtering. At the WAP, you can configure which MAC addresses (the low-level firmware addresses of a wireless card) are allowed to connect to the WAP. Although this sounds like an ideal, easy way to secure a wireless network, consider the following issues:

  • It is easy to spoof an approved MAC address. Software, such as SMAC, allows you ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required