Network Security Fundamentals [Electronic resources]

Gert De Laet, Gert Schauwers

نسخه متنی -صفحه : 196/ 125
نمايش فراداده

Conclusion

When implementing wireless technologies in a secure network, some points need to be taken into consideration. Some risks are involved in offering wireless connections in your company. This chapter covered the different WLAN configurations and how WLANs work. The SAFE WLAN design techniques can be used to counter the risks of open wireless ports.