Wireless LAN Design and Setup

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Rogue AP containment methods

    Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these contai... 

  • Wireless AP placement basics

    Many installers make the mistake of treating 802.11 WLANs just like Ethernet, placing access points (APs) in locations that facilitate outsider access to corporate networks. But, from a security perspective, WLANs should be treated like the Internet ... 

  • The role of VPN in an enterprise wireless network

    Given improvements in Wi-Fi security, does VPN still have a role to play in enterprise wireless? What are the practical benefits and limitations of using VPN over wireless? This tip discusses where to make best use of VPNs and how to smooth over conf... 

  • How to compartmentalize WiFi traffic with a VLAN

    Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilities, found in both wired and wireless devices, to tag a... 

  • Wireless Security Lunchtime Learning Entrance Exam 2

    Test you knowledge of wireless security before jumping into the lessons. 

  • 802.1X Port Access Control: Which version is best for you?

    Which of the nearly 50 defined EAP Types would work best in your WLAN? In this tip, we compare the most popular EAP Types used with 802.1X, authentication methods that can be supported by each, known vulnerabilities and suitable usage environments. 

  • Lesson 2 quiz: From the ground up

    Find out how much you learned in Lesson 2 of Wireless Security Lunchtime Learning. 

  • A list of wireless network attacks

    Get more information on wireless attacks with this article from free information security training program Wireless Security Lunchtime Learning, which references a list of attacks against 802.11 and 802.1X, such as war driving and man in the middle a... 

  • Lesson 3 quiz: Who goes there?

    Put your new knowledge of wireless access to the test. 

  • Lesson 3: How to implement secure access 2

    In Lesson 3 of Wireless Security Lunchtime Learning, you'll learn the pros and cons of the various wireless access protocols so that you can choose the best method to control, authenticate and authorize access to your WLAN.