Requires Free Membership to View
|
||||
In a four-part video series, Joel Snyder of Opus One goes beyond the basics of building a solid infrastructure and carefully walks you through the phases of a secure wireless network setup. Learn the policies, technologies, and standards that are absolutely essential in providing usability, availability and security to the enterprise network.
Use the summary briefs below to jump to full descriptions of each video.
|
||||||||
|
||||||||
PART 1: Wireless network security: 802.11i basics
In this video, Joel Snyder of Opus One reviews the protocols, along with the other minimum requirements necessary for building a secure network.
PART 2: How to manage guest user authentication when building a wireless network
Joel Snyder reviews your different choices and how to deal with the threat of unauthenticated users.
PART 3: How to increase the RF footprint and bandwidth of a wireless network
After revealing the two most important qualities of an enterprise network service, Joel Snyder reviews how to provide sufficient bandwith for users' needs.
PART 4: Must-haves for wireless network security: WLAN switches, intrusion detection, and more
Joel Snyder reviews the switch technology and explains why intrusion detection systems and firewalls need to also be carefully added to a "defense in depth" network configuration.
A proper enterprise wireless network setup must always begin with a good base, one that uses standards like 802.11i and WPA. Users need to connect to access points securely.
Because wireless Internet access is now considered a common utility, handling guest user acess deserves careful consideration. Depending on your organization, there are various options -- some more conservative than others -- for outbound and inbound policies.
An acceptable business class wireless network requires aggressive management of an organization's radio frequency (RF) footprint and bandwidth. The employees in your office -- wherever they're located in the building -- will need to have network services readily available to them.
Devices like a WLAN switches, which can manage hundreds access points, deserve a look, especially when setting up an enterprise wireless network.
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation