Chapter 2. Legacy 802.11 Security

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • Authentication

    • Open System Authentication

    • Shared Key Authentication

  • Wired Equivalent Privacy (WEP) Encryption

  • Virtual Private Networks (VPNs)

    • Point-to-Point Tunneling Protocol (PPTP)

    • Layer 2 Tunneling Protocol (L2TP)

    • Internet Protocol Security (IPsec)

    • Configuration Complexity

    • Scalability

  • MAC Filters

  • SSID Segmentation

  • SSID Cloaking

Legacy 802.11 Security

If this chapter was strictly about legacy 802.11 security as defined by the standard, then it would be a very short chapter indeed, since Open System authentication, Shared Key authentication, and WEP encryption are the only legacy security methods ...

Get CWSP® Certified Wireless Security Professional Official: Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.