Rate your favorite Cisco Press books.
Objectives
Upon completing this chapter, you will be able to
Identify the security risks of VoWLAN systems.
Differentiate the various encryption and authentication solutions.
Understand tips for implementing VoWLAN systems.
Because VoWLAN systems make use of wireless technology, you must consider security issues and corresponding countermeasures. This chapter addresses security issues and provides an overview of the security mechanisms available for protecting VoWLAN systems.