Index

Symbols

802 standards, History of 802.11
802.11 networks
core unit of, BSS and IBSS
security, Inherent Insecurity
(see also security)
, Inherent Insecurity
(see also WLANs)
802.11 PHY specifications, History of 802.11
802.11 protocols, What Is Wireless?, 802.11, History of 802.11
history of, History of 802.11, History of 802.11
MIB for, SNMP Monitoring
structure of 802.11 MAC, Structure of 802.11 MAC
802.11 Working Group, History of 802.11
802.11a specification, History of 802.11
802.11b networks
DoS attacks, 802.11b network DoS attacks
data-link DoS attacks, 802.11b data-link DoS attacks
physical DoS attacks, 802.11b physical attacks
interference from Bluetooth deployments, 802.11b physical attacks
802.11b specification, History of 802.11
802.11g specification, History of 802.11
802.1x protocol, 802.1x, Supplicant
clients on, Pieces of a Coherent System
equipment and configuration, 802.1x Equipment and Configuration, Supplicant
authentication server, Authentication server, Authentication server
authenticator, Authenticator
supplicant, Supplicant
limitations of, Limitations of 802.1x
structure of, Structure of 802.1x, Structure of 802.1x
vendors supporting, 802.1x Equipment and Configuration
WEP and, Limitations of 802.1x
802.3 CSMA/CD Access Method (see Ethernet)
802.3 Ethernet, What Is Wireless?

A

access points (see APs)
Address Resolution Protocol (ARP), Man-in-the-Middle Attacks
AH (Authenticated Header), IPsec in a Nutshell
AirPort Admin utility, AirPort Access Point Utilities
AirPort card, Card Configuration ...

Get 802.11 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.