Summary

In this chapter, we reviewed some of the basic security features of the 802.11 protocol and how they can be applied in both large and small wireless environments. We also reviewed how the basic wireless authentication and association building blocks fall into place.

As you can see in this chapter, the 802.11 specification works very well in simple environments; however, scaling the network to large deployments is very difficult using native 802.11 tools. Using built-in security mechanisms such as disabling SSID broadcasts, enabling MAC filtering, and WEP are great for small deployments.

However, these solutions fall apart in large environments:

  • SSID broadcasts are needed to enable roaming between APs.

  • MAC filtering is not practical because ...

Get How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.