This chapter looks at security component best practices for deployment of a secure WLAN. It draws on earlier chapters that describe the Structured Wireless-Aware Network (SWAN) architecture and WLAN design components. This chapter focuses on the following subjects:
Rogue access point (AP) detection and prevention
WLAN monitoring and intrusion detection
WLAN services scaling
Enterprise guest access