Deploying VPNs in WLANs

Figure 13.1 shows the most common business configuration of wireless access points in use today. In this case, a rogue access point installed on a user machine sits inside perimeter defenses and allows the hacker a wide-open backdoor. The rogue access point is often installed by an employee who wants wireless access at work, or a network administrator who has forgotten about a prior test installation. If after reading this book you get “owned” by such a configuration, you have only yourself to blame. Grab your iPAQ right now and go “war walking” around the perimeter of your building.

Figure 13.1. A rogue wireless access point.

Figure 13.2 shows a better configuration. In this case, the wireless access point is placed ...

Get Maximum Wireless Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.