Conclusion
When implementing wireless technologies in a secure network, some points need to be taken into consideration. Some risks are involved in offering wireless connections in your company. This chapter covered the different WLAN configurations and how WLANs work. The SAFE WLAN design techniques can be used to counter the risks of open wireless ports.