E-DOC-CTC-20060609-0001 v2.0
Chapter 3
Security
26
Securing your WLAN
Securing a WLAN has evolved over the years. In this chapter you will find an overview of the techniques used
to secure your WLAN:
Topi c Page
“3.1 Disabling SSID Broadcasting” 27
“3.2 MAC Address Filtering” 28
“3.3 Wired Equivalent Privacy (WEP)” 29
“3.4 Wi-Fi Protected Access (WPA)” 31
“3.5 WPA2” 35