Microsoft White Paper – Secure Wireless Access Point Configuration
In this white paper you will receive guidance about configuring wireless access points to support Wi-Fi protected access (WPA) and configuring the required supporting network infrastructure.
Businesses that have deployed wireless networks usually have many concerns about the security of their solution, whereas businesses that have shied away from wireless technology worry about the obvious productivity and infrastructure savings they may have missed. Well-publicized flaws were discovered in the first generation of IEEE 802.11 WLAN security protocols. Even though many workarounds have been developed through the years, the typical solutions offered to address wireless security issues have either been too costly or have had their own inherent flaws. As the technology has matured to allow for higher speeds and more reliability, the standards used to secure wireless transmissions have also matured. The latest wireless security protocols, WPA and WPA2, based on the IEEE 802.11i standard, help provide strong protection for wireless traffic even in the most rigorous security environments. These current standards, when configured properly, are much more secure and can be used with a high level of confidence in a midsize business environment. This guidance discusses the challenges that midsize businesses face when considering wireless networks, and provides valuable information to design and implement an effective solution for securing a Wireless Access Point (WAP). The solution for securing a midsize business wireless network includes:
· Assessing WLAN Security
· Developing a Secure WLAN Solution
· Deployment and Management
White Papers
‘All You Need to Know About Microsoft Windows Nano Server’ Veeam White Paper
Now updated for Windows Server 2016 GA release! You probably heard about Windows Nano Server already … but what is it exactly, and how do you get started with it? What value will it bring to your environment? Nano Server is a headless, 64-bit only deployment option for Windows Server 2016. Microsoft created this component specifically with […]
Share this:
‘The Citrix Administrator’s Guide to Citrix ICA/HDX’ White Paper
‘The Technical Guide to Migrating from Citrix 6.5 to 7.x and Replacing EdgeSight’ White Paper
Complete Guide to Understanding the Citrix Logon Process
‘Securing IGEL OS Endpoints’ White Paper
‘Managing Java Application Performance in a Citrix Environment’ White Paper