Summary

As discussed throughout this chapter, the customer’s deployment criteria determined the deployment model used in each deployment example. The customer adjusted the selected deployment model to suit his deployment environment. However, each scenario presented unique deployment challenges based on the selected deployment model. The customer usually made a trade-off between desired security strength and ease of deployment.

Get Cisco Wireless LAN Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.