Meraki MR34 Cloud Managed AP MR34-HW Leaflet
Product codes
MR34-HW
Introduction
Wireless Security Threats in an Enterprise Environment
Secure WiFi access has become a critical component of enterprise networking. WiFi Internet
access is critical for corporate communication in verticals including financial services, retail, and
distributed enterprise. Due to the widespread use of WiFi and variety of use cases (e.g., point-of-
sale (POS) communications, corporate access, warehouse inventory, asset tracking, WiFi services
for targeted advertising), the wealth of information transmitted across the wireless medium
has skyrocketed. Data transmitted over wireless increasingly contains sensitive personal and
financial data. Unfortunately, the tremendous growth in wireless has been accompanied with
an increasingly widespread ability to obtain open-source hacking tools that can compromise a
wireless network through impersonation of client devices and access points.
access is critical for corporate communication in verticals including financial services, retail, and
distributed enterprise. Due to the widespread use of WiFi and variety of use cases (e.g., point-of-
sale (POS) communications, corporate access, warehouse inventory, asset tracking, WiFi services
for targeted advertising), the wealth of information transmitted across the wireless medium
has skyrocketed. Data transmitted over wireless increasingly contains sensitive personal and
financial data. Unfortunately, the tremendous growth in wireless has been accompanied with
an increasingly widespread ability to obtain open-source hacking tools that can compromise a
wireless network through impersonation of client devices and access points.
Examples of common threats in a modern WiFi environment include:
Network impersonation: achievable by purchasing any consumer-grade access point and
copying an SSID, “tricking” clients into thinking that this SSID is available and snooping on their
information transactions.
copying an SSID, “tricking” clients into thinking that this SSID is available and snooping on their
information transactions.
Figure 1: Example of SSID spoofing threat in a retail environment
Legitimate SSID
Malicious SSID
Unsuspecting user
connects to malicious
SSID
connects to malicious
SSID
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com
3