Introduction

By now, you've read all about the 802.11 protocol, its many weaknesses, and some of the native solutions for deploying a secure network. The remainder of this book is designed to help you deploy wireless securely in a variety of configurations. Common to all of these configurations is the point at which the wireless network touches the wired network. This is where the rubber meets to road.

In this chapter, we will review some basic architectural concepts, including VPNs, 802.1x, and firewalls.

Get How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.