O'Reilly logo

CCNA Wireless Official Exam Certification Guide by Brandon James Carroll

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 17. Securing the Wireless Network

This chapter covers the following subjects:

Threats to Wireless Networks: Discusses threats to wireless networks.

Simple Authentications: Looks at basic wireless security.

Centralized Authentication: Shows how centralized authentication works using various EAP methods.

Authentication and Encryption: Describes WPA and WPA2.

It’s usually obvious that the medium of wireless networks can be more easily accessed from the outside than wired networks. This calls for a great deal of thought when you deploy a wireless network. What security do you need? What security measures can you perform? What are the security capabilities of your equipment? Should you authenticate users when they access the network? Should ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required