O'Reilly logo

Cisco Wireless LAN Security by Andrew Balinsky, Darrin Miller, Krishna Sankar, Sri Sundaralingam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Admission Control Design

The final topic in this chapter builds on the previous WLAN security frameworks and extends the concept of network admission beyond what has been discussed previously in this book. In this concept, admission to the network at Layer 3 or Layer 2 is determined not only by the user or machine’s identity but by the compliance of the WLAN devices to a corporate policy for a variety of criteria. These criteria include antivirus software from vendor XXXX, version YYYY, which must be active and compliant to the latest AV definition files. The intent of this solution is to improve the network’s capability to identify, prevent, and adapt to threats. The admission control allows the network designer to make a policy decision on ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required