Managing Wireless Networks
EPICenter Concepts and Solutions Guide
124
The Wireless Interface Report delves further into the configuration and status of individual interfaces
associated with Wireless APs. This report details the security requirements for hosts connecting to the
network through that interface as well as the number of clients associating through that interface.
Refer to Chapter 16 in the EPICenter Reference Guide for details on the Wireless AP Report and the
Wireless Interface Report.
Security Monitoring with Reports
Wireless networks require stringent security controls to ensure identity and confidentiality within and
external to your enterprise network. Without a proper security policy in place, any rogue client could
gain access to your enterprise networks not only from within your physical building, but from any
place within range of your APs. Because wireless extends your wired infrastructure beyond the physical
limitations of cabling, your network becomes vulnerable to external security breaches if you do not
control and monitor the security aspect of your wireless network. Security breaches include both
unauthorized host access and unauthorized (rogue) APs that allow insecure communications beyond
the boundaries of your security policy.