Iuwne10 S04 L07
Upcoming SlideShare
Loading in...5
×
 

Iuwne10 S04 L07

on

  • 379 views

 

Statistics

Views

Total Views
379
Views on SlideShare
379
Embed Views
0

Actions

Likes
0
Downloads
34
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Lesson Aim

Iuwne10 S04 L07 Iuwne10 S04 L07 Presentation Transcript

  • Module Summary
      • Authentication proves the user or device identity, while encryption protects the frame from eavesdropping.
      • Open authentication provides no user authentication and can be used in combination with a stronger system; WEP provides authentication and encryption but is a weak protocol.
      • A good way to enforce authentication is to use a central server and authenticate each user individually.
      • WPA and WPA2 create the framework for a stronger authentication and encryption; Cisco Centralized Key Management can be added to increase roaming efficiency.
      • Most of the available security features can be configured on the controller; most of the EAP types will simply be relayed, and the controller will use the angle of the encryption to categorize the security type.
  •