Jumaat, 17 Oktober 2008

Wireless security standards and protocols fall into 3 categories

Ensures privacy of data transmitted through the air
Can be done at Layer 2 (WEP, TKIP, AES) or Layer 3 (VPN)

Ensures that only authorized users with proper credentials are allowed to use the network
Authentication methods include EAP, captive portal, VPN

Access Control
Provides a policy enforcement structure to control the traffic of authorized users, including networks, bandwidth, time of day, and protocols