tailieunhanh - MERAKI WHITE PAPER: WIRELESS LAN SECURITY

Perimeter security solutions control access to critical network applications, data, and services so that only legitimate users and information can pass through the network. This access control is handled by routers and switches with access control lists (ACLs) and by dedicated firewall appliances. A firewall provides a barrier to traffic crossing a network’s “perimeter” and permits only authorized traffic to pass, according to a predefined security policy. Complementary tools, including virus scanners and content filters, also help control network perimeters. Firewalls are generally the first security products that organizations deploy to improve their security postures. Cisco provides organizations considerable flexibility in firewall choices. The Cisco PIX®. | meraKL Meraki White Paper Wireless LAN Security Version March 2009 Robust security is a requirement for many companies deploying a wireless network. However creating a secure wireless network has often been difficult and time-consuming. This paper describes the security requirements for most companies and how Meraki can help them meet those challenges easily and at a low cost. Copyright 2009 Meraki Inc. 1 of 13 Copyright 2009 Meraki Inc. All rights reserved. Trademarks Meraki is a registered trademark of Meraki Inc. 660 Alabama St. San Francisco California 94110 Phone 1 415 632 5800 Fax 1 415 632 5899 2 of 13 Wireless LAN Security Table of Contents 1 The Need For 2 WhatDoesn 3 Recommended Security Shared Key WPA2-PSK .7 User Authentication WPA2-Enterprise .7 Hybrid 4 5 Example 6 7 8 3 of .

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.