
135
Chapter 7
Configuring Security
This chapter explains how to use different security solutions to ensure
that you have a secure wireless network. This chapter covers these
topics:
❑ Understanding Security on page 136
❑ Enabling Access Methods on page 139
❑ Enabling Secure IAPP and Secure Wireless Hops on page 141
❑ Setting Up Logins on page 143
❑ Configuring WEP 64/128 Security on page 148
❑ Using an Access Control List (ACL) on page 151
❑ Configuring 802.1x Security on page 154
Kommentare zu diesen Handbüchern