Chapter 12. WLAN Security Configuration Guidelines and Examples

This chapter provides detailed configuration examples and guidelines for various security implementations such as guest access (open/no Wired Equivalent Privacy [WEP]), static WEP, MAC-address authentication, 802.1x authentication protocol with dynamic WEP, 802.1x authentication protocol with Wi-Fi Protected Access (WPA), WPA Preshared Key (WPA-PSK), multiple Service Set Identifiers (SSIDs) along with wired VLANs, and IP security–based virtual private network (IPSec VPN). It provides secure management configuration examples to secure management traffic to the WLAN infrastructure devices and discusses secure wired policies (for example, Layer 3/Layer 4 ACLs) to match wireless policies. ...

Get Cisco Wireless LAN Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.