This chapter covers the following subjects:
Threats to Wireless Networks: Discusses threats to wireless networks.
Simple Authentications: Looks at basic wireless security.
Centralized Authentication: Shows how centralized authentication works using various EAP methods.
Authentication and Encryption: Describes WPA and WPA2.
It’s usually obvious that the medium of wireless networks can be more easily accessed from the outside than wired networks. This calls for a great deal of thought when you deploy a wireless network. What security do you need? What security measures can you perform? What are the security capabilities of your equipment? Should you authenticate users when they access the network? Should ...