Chapter 11. Operational and Design Considerations for Secure WLANs

This chapter looks at security component best practices for deployment of a secure WLAN. It draws on earlier chapters that describe the Structured Wireless-Aware Network (SWAN) architecture and WLAN design components. This chapter focuses on the following subjects:

  • Rogue access point (AP) detection and prevention

  • WLAN monitoring and intrusion detection

  • WLAN services scaling

  • Enterprise guest access