Eleven Myths About 802.11 Wi-Fi Networks
Wi-Fi networks have been misunderstood by much of the IT community since their inception. Even the reasons for this misunderstanding are kind of hard to understand. The result has been that myths about 802.11 (better known as Wi-Fi) networks have grown almost as fast as the technology itself. In this web seminar, we'll examine 11 common Wi-Fi myths and explore ways to use correct information to make your networks scalable, secure and satisfying for your users.
- Myth #1: If you leave your Wi-Fi adapter turned on, someone could easily hijack your notebook and take control of your computer.
- Myth #2: Even with 802.11i, you still need a VPN to provide enterprise-class security for a wireless network.
- Myth #3: Captive Portals are an effective way to prevent unauthorized users from accessing a network via Wi-Fi.
- Myth #4: Disabling the SSID broadcast will hide your wireless network from wardrivers and hackers.
- Myth #5: You need a wireless IDS to prevent rogue access points.
- Myth #6: A wireless IDS is unnecessary if other rogue AP prevention measures are in place.
- Myth #7: Assigning low Wi-Fi data rates is a good way to make sure that every station gets equal bandwidth.
- Myth #8: If channels 1, 6, and 11 are already being used, it's best to choose another channel somewhere in the middle.
- Myth #9: When an 802.11b station connects to an 802.11g network, the entire network is reduced to 802.11b speeds.
- Myth #10: If you need more Wi-Fi coverage, replace the antenna on your access point with one that has a higher gain.
- Myth #11: You can point two antennas in different directions to get more area covered with one access point.
- Question & Answer Session
Who Should Watch and Why?
- Administrators: network, systems, infrastructure, security, and LAN/WLANs
- Support professionals: technical assistance and field support
- Designers: network, systems, and infrastructure
- Developers: wireless software and hardware products
- Consultants and integrators: IT and security
- Decision makers: infrastructure managers, IT managers, security directors, chief security officers, and chief technology officers