O'Reilly logo

Cisco Wireless LAN Security by Andrew Balinsky, Darrin Miller, Krishna Sankar, Sri Sundaralingam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

General Security Recommendations

After answering the preceding fundamental questions, the network designer can move on to build the general security baseline. The following sections discuss general security recommendations for the security baseline. All of the following areas are related, and a requirement in one area drives requirements and network design decisions in other areas. For example, assume that a particular application drives the WLAN deployment and that this application has a low tolerance for packet loss to the application server and requires that the client device not change IP addresses during an application session. The application must also cover a large area, which requires multiple APs for sufficient coverage. This requirement ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required