Iuwne10 S04 L07

376 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
376
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
41
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Lesson Aim <Enter lesson aim here.>
  • Iuwne10 S04 L07

    1. 1. Module Summary <ul><ul><li>Authentication proves the user or device identity, while encryption protects the frame from eavesdropping. </li></ul></ul><ul><ul><li>Open authentication provides no user authentication and can be used in combination with a stronger system; WEP provides authentication and encryption but is a weak protocol. </li></ul></ul><ul><ul><li>A good way to enforce authentication is to use a central server and authenticate each user individually. </li></ul></ul><ul><ul><li>WPA and WPA2 create the framework for a stronger authentication and encryption; Cisco Centralized Key Management can be added to increase roaming efficiency. </li></ul></ul><ul><ul><li>Most of the available security features can be configured on the controller; most of the EAP types will simply be relayed, and the controller will use the angle of the encryption to categorize the security type. </li></ul></ul>

    ×