O'Reilly logo

Cisco® Networking All-in-One For Dummies® by Edward Tetz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3: Securing Your WLAN

In This Chapter

check.png Finding out why using a secure WLAN is good practice

check.png Checking out various security risk mitigation methods

check.png Securing your management interface

To work with wireless networking, you need to know how to utilize the many options available to secure various aspects of your wireless network so that your data and private information remain private. Unlike wired networks, with wireless, you can never be sure where the users might be, which complicates network security. You can choose from many methods to secure wireless signals, such as Wi-Fi Protected Access (WPA) and WPA2; or to secure the entire wireless local area network (WLAN) or service set identifier (SSID), such as isolation via virtual local area networks (VLANs) or physical separation of the entire WLAN infrastructure.

In this chapter, I review some of the risks that you have to deal with and discuss the steps that you can take to reduce them.

warning_bomb.eps Give the contents of this chapter a lot of thought prior to deploying your wireless network within your organization because wireless security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required