Summary

The intent of this chapter was to provide some best-practice examples of how to deal with some of the operational and design challenges of deploying secure WLANs. The chapter provided guidance on how to handle rogue AP detection and how to scale RADIUS and VPN services and gave the reader options for handling guest access. As always, the best practices that the network designer decides to implement depend upon his particular environment.

Get Cisco Wireless LAN Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.