Chapter 2 Legacy 802.11 Security

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

Authentication

Wired Equivalent Privacy (WEP) encryption

Temporal Key Integrity Protocol (TKIP) Encryption

Virtual Private Networks (VPNs)

MAC Filters

SSID Segmentation

SSID Cloaking

Many changes to the security mechanisms of the 802.11 standard have taken place since its ratification in 1997. Three pre-RSNA or legacy security mechanisms exist: Open System authentication, Shared Key authentication, and WEP encryption. These pre-RSNA security mechanisms ...

Get CWSP, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.